Authentication Bypass
Fourth section in Jr Penetration Tester learning path.
Username Enumeration
A list of usernames can be helpful, we can use website error messages to get this information. For example, if we try various usernames on a login forms and get an error "An account with this username already exists" - we can use this to generate a list of potentially valid usernames. An example of this with ffuf:
Brute Force
With a valid list of usernames, a brute force attack can be attempted with ffuf.
Logic Flaw
A logic flaw is when the logical path of an app is bypassed, circumvented or otherwise manipulated.
Cookie Tampering
Editing cookies in an online session can have multiple outcomes. The contents of cookies can be in plain text and obvious, for example, a cookie could be:
Set-Cookie: logged_in=true
Cookies can also be set as hashes, online tools like Crackstation can be used to crack them and figure out what they are. Similarly, they can also be encoded to obfuscate what they actually are.
Last updated