Instruction

This lab is subtly vulnerable to username enumeration and password brute-force attacks. It has an account with a predictable username and password, which can be found in the following wordlists:

To solve the lab, enumerate a valid username, brute-force this user’s password, then access their account page.


Solution

1. Find login request and send to Burp Intruder

First, try to login from web UI and back to Burp Suite find the login request from Proxy > HTTP history and send to Burp Intruder.

2. Find the valid username

2.1. Configure payload

Configure the Intruder payload using this step:

  1. block the value of username
  2. click Add
  3. choose payload type as number list
  4. paste the username wordlists from here

Setup the Grep - Extract from the Setting panel. and now click Start attack button.

2.3. Check the attack results

After the attack is finished, we have new column named "warning", click this column for sorting the rows and we notice that the error message is different among the others. It indicate the auth is a correct username.

3. Find the valid password

3.1. Configure payload

Now use the username that we found from the previous step for brute force the login password. Configure the password with this steps:

  1. set the username based on prev step
  2. block the value of password
  3. click Add
  4. set payload type as number list
  5. paste the password wordlists from here
  6. click the Start attack

3.2. Check the attack results

Check the results with this steps:

  1. sort the column Status code
  2. notice that the top row we receive 302 response that indicate success login.

4. Test login

Open the web ui in login page, try to login with username and password that we found from previous steps.


Thanks for reading