Authentication Vulnerabilties
Sometimes if you log back in correctly, you can reset a timeout
- Create a list with the correct creds every x times
- Set
Resouce Poolin Intruder with Maximum concurrent requests set to1. sed 'a\correct_password' pass.txt > pass1.txtsed 'a\peter' pass.txt > pass1.txtto copy user list over and over
It may be that lockout only happens to legit account, so a lockout error may be evidence that an account is real
Basic auth: Authorization: Basic base64(username:password)
MFA
Ex:
- Notice that in the
POST /login2request, theverifyparameter is used to determine which user’s account is being accessed. - Send the
GET /login2request to Repeater. Change the value of theverifyparameter tocarlosand send the request. This ensures that a temporary 2FA code is generated for Carlos. - Go to the login page and enter your username and password. Then, submit an invalid 2FA code.
- Send the
POST /login2request to Intruder. - In Burp Intruder, set the
verifyparameter tocarlosand add a payload position to themfa-codeparameter. Brute-force the verification code.
Other
Always look at reset password and password change mechanisms, it’s possible that they can be done out of order or that the error codes will tell you something
- Current password and then two new passwords where entering two different new passwords only throws a code if the current password is correct