Due to the limitations (throttling) present in the Burp Suite Community Edition when using the Intruder tool (source), I had to constrain the complexity level of the test cases. Nevertheless, this is sufficient to demonstrate that the application is not resistant to brute-force attacks.
- Download and install Burp Suite Community Edition.
- Start Burp Suite.
- Go to
Intruder
>Payloads
tab. - In
Payload sets
section setPayload type
toSimple list
. - Open top-100-popular-passwords.txt file and copy all the content.
- In
Payload settings [Simple list]
section clickPaste
.
- Test 1 Report - test-1-report.md
- Test 2 Report - test-2-report.md
To create other scenarios just register customer with different email and password from the top-100-popular-passwords.txt file, fix the email in the Intruder
request textfield to match the user and start the attack.
As you can see from the test results, the application is not resistant to brute-force attacks. The attacker can easily guess the password of the registered customer. The application should implement some kind of throttling or account lockout mechanism to prevent brute-force attacks.