1. Found an email in a hidden `` tag in the **Recover Password** page: `webmaster@borntosec.com` 1. Got a list of common passwords to test from [https://github.com/duyet/bruteforce-database/blob/master/38650-password-sktorrent.txt]() 1. Made a script to brute force the login If you're getting false positives with the script use a smaller `BATCH_SIZE`. **How to protect against this?** [https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/04-Authentication_Testing/07-Testing_for_Weak_Password_Policy]() - 2FA - Strong password policy - Forbid password reuse - Password aging