Home 🕸️ PSA - Auth 1 - Username enumeration via different responses
Post
Cancel

🕸️ PSA - Auth 1 - Username enumeration via different responses

Difficulty: Apprentice

🎯 Goal

This lab is vulnerable to username enumeration and password brute-force attacks. It has an account with a predictable username and password.

To solve the lab, enumerate a valid username, brute-force this user’s password, then access their account page.

✅ Solution

First let’s try to login with any creds:

wrong credentials Log in with wrong credentials

We can see a message saying “Invalid username”.

Let’s look at the query using Burp:

1
username=abc&password=def

We will brute-force the username using a Sniper attack with the provided wordlist.

1
username=§abc§&password=def

username brute-force Username brute-force results

Sorting the results by response length set one username apart: puppet.

If we try it:

good username Log in with good username

We have the username, we can repeat the same attack for the password:

1
username=puppet&password=§def§

password brute-force Password brute-force results

Again, sorting the results by response length set one password apart: 11111111.

Let’s try it on the form:

good credentials Log in with good credentials

Challenge done ✅

This post is licensed under GNU GPLv3 by the author.