githubEdit

Web Login Bypass

Common Default Credentials

Check if the website has not changed credential from the default username/password.

admin:admin
admin:password
admin:password1
admin:password123
admin:passw0rd
admin:(empty)
admin:12345

administrator:password
administrator:password1
administrator:password123
administrator:passw0rd
administrator:(empty)
administrator:12345

# phpIPAM
admin:ipamadmin
Admin:ipamadmin

# PHPMyAdmin
root:(null)
root:password

SQL Injections

Try the following inputs in the form.

Password Omitting

If we know the username of an existing account, try to add suffix '-- - to the username for forcing the server internally to omit the password.

When the login is successful, not only can we log in with that user, but we can also fuzz with other usernames.

NoSQL Injection

Reference: https://portswigger.net/web-security/nosql-injectionarrow-up-right

Mongo

  • Operators

    After finding usernames, we can also obtain the passwords using the “$regex” operator as the following example.

  • Operators in Json

    If the above payloads not working, try changing to a json format. We also need to change the value of the Content-Type to “application/json” in the HTTP header.

SQL Injection with SQLmap

Alternatively, we can automate SQLi using sqlmap.

Please see SQL Injection with Sqlmaparrow-up-right page for details.

Wildcard Brute Force

If it is allowed to login with wildcard (*), you may be able to find the username/password with brute force.

For example, in Turbo Intruder (Burp Suite), login attempt with alpha numeric characters one by one.

My favorite wordlist for it is the seclists: https://github.com/danielmiessler/SecLists/blob/master/Fuzzing/alphanum-case-extra.txtarrow-up-right

Password Reset Exploit

We may be able to retrieve the password reset link by specifying our email address instead of (in addition to) the victim email address without validation.

Brute Force Credentials

Before brute forcing, we need wordlists used for it.

If we can predict the target password reasonably, we can generate passwords from the password.

Using Ffuf

Also we can use raw request file of Burp Suite.

  1. Send request in Burp Suite.

  2. Right-click on the request screen.

  3. Click "Copy to file" in the menu.

  4. Edit the raw file to change target value to "FUZZ" keyword.

After that, we can use it in the ffuf command.

Using Hydra

Using Wfuzz

References

Last updated