Post

Username enumeration via response timing ( Auth Lab 3 )

Platform : Port swigger Web Security Academy

Module : Authentication Vulnerabilities

Difficulty : PRACTITIONER

lab url : Lab Link


Tool used :


Credintials - wiener:peter


Step 1 : For experiment i tried four times with wrong password server is blocking my ip address .

step 2 : X-Forwarded-For used to spoof the ip address and bypass the ip based brute force protection.

Step 3 : using responder i manually checked response time from server by doubling the password length

Step 4 : I forwareded the request to intruder for finding username using brute force attack

username wordlist - Username

Step 5 : for this attack i used pitch forck attack, select X-Forwarded-For and username for brute forcing .

Step 6 : selct the payload 1 type as number and for number range i have given from 5 to 105

Step 7 : For payload 2 type as list and paste the username list from the provider.

Step 8 : One responce took more time than others it like to be a correct username

Step 9 : copy the username and go back to the intruder section clear selected payloads, add $ to X-Forwarded-For and password.

Step 10 : for payload 1 type as number and for number range i have given from 5 to 105

Step 11 : For payload 2 type as list and paste the password list from the provider.

username wordlist - Password

Step 12 : If the credintials is correct server repond with 302 code .

This post is licensed under CC BY 4.0 by the author.