Showing 36 Result(s)

Writeup: Brute-forcing a stay-logged-in cookie

Lab link. Persistent cookies are used in sections such as “Remember me”. Some websites keep This cookie in predictable values or simple hashed form. In this Lab, operations are also done through cookies, we will examine this first. We need a hash-type detector to solve the structure in Cookie, you can use whatever you want. …

Writeup: 2FA bypass using a brute-force attack

Lab link. There is a weakness in the system related to 2FA authentication. To understand the structure of the vulnerability, we enter the system with the credentials given to us. If the MFA code is sent incorrectly twice, the system redirects us back to the login page. This makes our brute-force attack fail. For this …

Writeup: 2FA broken logic

Lab link. On the 2FA login pages, we send the MFA code, which is our last request. We leave only the verify component in the cookie value and make it carlos instead of wiener. When we send the request, we get the information that the MFA code is incorrect, which indicates that the system is …

Writeup: Username enumeration via account lock

Lab link. Certain suspicious accounts can be locked by the system. In this lab, our goal is to find the username first and then the password. We don’t get any time block when we make a few wrong attempts. We move our request to the intruder. To get an account lockout error, we need to …

Writeup: Broken brute-force protection, IP block

Lab link. We need to find the password for the user carlos. We know there is a logic flaw, so let’s make a few false entries and try to understand the system. After 3 login attempts, the system displays “You have made too many incorrect login attempts. Please try again in 1 minute(s).” error. We …