aboutsummaryrefslogtreecommitdiffstats
path: root/Brute force password guessing/notes.md
blob: a66c5dcc13e98c0517b72994cb767cd087599e3c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
1. Found an email in a hidden `<input>` tag in the **Recover Password** page: `webmaster@borntosec.com`
1. Got a list of common passwords to test from [https://github.com/duyet/bruteforce-database/blob/master/38650-password-sktorrent.txt]()
1. Made a script to brute force the login

If you're getting false positives with the script use a smaller `BATCH_SIZE`.

**How to protect against this?**

[https://owasp.org/www-project-web-security-testing-guide/stable/4-Web_Application_Security_Testing/04-Authentication_Testing/07-Testing_for_Weak_Password_Policy]()

- 2FA
- Strong password policy
- Forbid password reuse
- Password aging