Part 2
Utilizing Burp Sequencer
Login to application to get a session id/cookie
Find a request that is associated with session/cookie value in a server response
Send this request to Burp sequencer> go to Sequencer tab
In Live capture menu, select cookie value and Start live capture
ENSURE THAT RESULTS ARE ABOIVE FIPS PASS LEVEL
Note: This is very noisy
smuggler.py usage:
# single host
smuggler.py -u $URL
# from a list
cat list_of_hosts.txt | python3 smuggler.pyDoes every form have anti-CSRF token present
Referer header used for origin validation?
Token Testing
Conduct test with token of the same length
Conduct test for static/known values
Conduct test with token from a separate session
Test previous valid token
Test with no token
Predictable?
Will XSS steal the token?
Able to swap HTTP request methods? (Get to POST)
Default Credentials
https://www.cirt.net/passwords
Weak Bruteforce Protections
CAPTCHA
A weak implementation where the PHP code places the image's content into the id field.
Rate Limiting
The following script, understand messages related to rate-limiting and successful login attempts.
Insufficient Protections
X-Forwarded-For Header
Brute Force Usernames
User Unknown Attack
Timing Attack
Brute Forcing Passwords
Password Inference
Families are:
![[Pasted image 20230309204953.png]]
Predictable Reset Token
Time-Based Token Script
Short Tokens
We can brute force this with FFUF.
Test for XSS and SQLi
Enter in EVERY parameter
'"` Javascript injection test
'`"> html tag attribute test
HTML injection
${{7*7}} CSTI + SSTI
--'`" SQLi
Last updated