Authentication Vulnerabilities - Lab #1 Username enumeration via different responses | Long Version

Authentication Vulnerabilities - Lab #1 Username enumeration via different responses | Long Version

7.494 Lượt nghe
Authentication Vulnerabilities - Lab #1 Username enumeration via different responses | Long Version
In this video, we cover Lab #1 in the Authentication module of the Web Security Academy. This lab is vulnerable to username enumeration and password brute-force attacks. It has an account with a predictable username and password, which can be found in the following wordlists: Candidate usernames: https://portswigger.net/web-security/authentication/auth-lab-usernames Candidate passwords: https://portswigger.net/web-security/authentication/auth-lab-passwords To solve the lab, we enumerate a valid username, brute-force this user's password, then access their account page. ▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬ Buy my course: https://academy.ranakhalil.com/p/web-security-academy-video-series ▬ 📚 Contents of this video 📚 ▬▬▬▬▬▬▬▬▬▬ 00:00​​​ - Introduction 00:12 - Web Security Academy Course (https://bit.ly/30LWAtE) 01:23 - Navigation to the exercise 01:50 - Understand the exercise and make notes about what is required to solve it 02:24 - Exploit the lab 06:40 - Summary 07:13 - Thank You ▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬ Notes.txt document: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/broken-authentication/lab-01/notes.txt Web Security Academy Lab Exercise: https://portswigger.net/web-security/authentication/password-based/lab-username-enumeration-via-different-responses Rana's Twitter account: https://twitter.com/rana__khalil