🟒Username enumeration via different responses

This lab is vulnerable to username enumeration and password brute-force attacks. It has an account with a predictable username and password, which can be found in the following wordlists:

Candidate usernames
Candidate passwords

To solve the lab, enumerate a valid username, brute-force this user's password, then access their account page.

send POST page to intruder
enter payload list for username
username "an" returns a different length
set up intruder for password field
enter payload list for password
password "monitor" returns a 302 redirect code
using 'an:monitor' solves the lab

Alternative

This script runs and shows the response code returned.

Last updated