Lab: Password brute-force via password change
This lab's password change functionality makes it vulnerable to brute-force attacks. To solve the lab, use the list of candidate passwords to brute-force Carlos's account and access his "My account" page.
- Candidate passwords
- With Burp running, log in and experiment with the password change functionality. Observe that the username is submitted as hidden input in the request.
Notice the behavior when you enter the wrong current password. If the two entries for the new password match, the account is locked. However, if you enter two different new passwords, an error message simply states
Current password is incorrect. If you enter a valid current password, but two different new passwords, the message says
New passwords do not match. We can use this message to enumerate correct passwords.
Enter your correct current password and two new passwords that do not match. Send this
POST /my-account/change-passwordrequest to Burp Intruder.
In Burp Intruder, change the
carlosand add a payload position to the
current-passwordparameter. Make sure that the new password parameters are set to two different values. For example:
- On the "Payloads" tab, enter the list of passwords as the payload set
On the "Options" tab, add a grep match rule to flag responses containing
New passwords do not match. Start the attack.
When the attack finished, notice that one response was found that contains the
New passwords do not matchmessage. Make a note of this password.
In your browser, log out of your own account and lock back in with the username
carlosand the password that you just identified.
- Click "My account" to solve the lab.