MENU

Fun & Interesting

Authentication Vulnerabilities - Lab #1 Username enumeration via different responses | Long Version

Rana Khalil 6,834 lượt xem 1 year ago
Video Not Working? Fix It Now

In this video, we cover Lab #1 in the Authentication module of the Web Security Academy. This lab is vulnerable to username enumeration and password brute-force attacks. It has an account with a predictable username and password, which can be found in the following wordlists:

Candidate usernames: https://portswigger.net/web-security/authentication/auth-lab-usernames
Candidate passwords: https://portswigger.net/web-security/authentication/auth-lab-passwords

To solve the lab, we enumerate a valid username, brute-force this user's password, then access their account page.

▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: https://academy.ranakhalil.com/p/web-security-academy-video-series

▬ 📚 Contents of this video 📚 ▬▬▬▬▬▬▬▬▬▬
00:00​​​ - Introduction
00:12 - Web Security Academy Course (https://bit.ly/30LWAtE)
01:23 - Navigation to the exercise
01:50 - Understand the exercise and make notes about what is required to solve it
02:24 - Exploit the lab
06:40 - Summary
07:13 - Thank You

▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Notes.txt document: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/broken-authentication/lab-01/notes.txt
Web Security Academy Lab Exercise: https://portswigger.net/web-security/authentication/password-based/lab-username-enumeration-via-different-responses
Rana's Twitter account: https://twitter.com/rana__khalil

Comment