Skip to content

to-panda5/brute-force-tests

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

Brute Force Tests

Note

Due to the limitations (throttling) present in the Burp Suite Community Edition when using the Intruder tool (source), I had to constrain the complexity level of the test cases. Nevertheless, this is sufficient to demonstrate that the application is not resistant to brute-force attacks.

Burp Suite setup

  1. Download and install Burp Suite Community Edition.
  2. Start Burp Suite.

Loading payload set

  1. Go to Intruder > Payloads tab.
  2. In Payload sets section set Payload type to Simple list.
  3. Open top-100-popular-passwords.txt file and copy all the content.
  4. In Payload settings [Simple list] section click Paste.

Performing the tests

  1. Test 1 Report - test-1-report.md
  2. Test 2 Report - test-2-report.md

To create other scenarios just register customer with different email and password from the top-100-popular-passwords.txt file, fix the email in the Intruder request textfield to match the user and start the attack.

Summary

As you can see from the test results, the application is not resistant to brute-force attacks. The attacker can easily guess the password of the registered customer. The application should implement some kind of throttling or account lockout mechanism to prevent brute-force attacks.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published