aboutsummaryrefslogtreecommitdiffstats
path: root/Brute force password guessing/notes.md
diff options
context:
space:
mode:
authorThomas Vanbesien <tvanbesi@proton.me>2026-03-26 19:50:11 +0100
committerThomas Vanbesien <tvanbesi@proton.me>2026-03-26 19:50:11 +0100
commit0df2b018e730f32915012ee466db1953a8b84cd3 (patch)
tree49d3688b2b3a1f72dbb08c851591eccf25a742b1 /Brute force password guessing/notes.md
parent7501efd7a8fd1dc4ba363e13f7cc33b491a8e5a4 (diff)
downloaddarkly-0df2b018e730f32915012ee466db1953a8b84cd3.tar.gz
darkly-0df2b018e730f32915012ee466db1953a8b84cd3.zip
Remove duplicate files
Diffstat (limited to 'Brute force password guessing/notes.md')
-rw-r--r--Brute force password guessing/notes.md14
1 files changed, 0 insertions, 14 deletions
diff --git a/Brute force password guessing/notes.md b/Brute force password guessing/notes.md
deleted file mode 100644
index a66c5dc..0000000
--- a/Brute force password guessing/notes.md
+++ /dev/null
@@ -1,14 +0,0 @@
-1. Found an email in a hidden `<input>` tag in the **Recover Password** page: `webmaster@borntosec.com`
-1. Got a list of common passwords to test from [https://github.com/duyet/bruteforce-database/blob/master/38650-password-sktorrent.txt]()
-1. Made a script to brute force the login
-
-If you're getting false positives with the script use a smaller `BATCH_SIZE`.
-
-**How to protect against this?**
-
-[https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/04-Authentication_Testing/07-Testing_for_Weak_Password_Policy]()
-
-- 2FA
-- Strong password policy
-- Forbid password reuse
-- Password aging