Authentication Vulnerabilities - Lab #1 Username enumeration via different responses | Short Versio
Описание
In this video, we cover Lab #1 in the Authentication module of the Web Security Academy. This lab is vulnerable to username enumeration and password brute-force attacks. It has an account with a predictable username and password, which can be found in the following wordlists:
Candidate usernames: https://portswigger.net/web-security/authentication/auth-lab-usernames
Candidate passwords: https://portswigger.net/web-security/authentication/auth-lab-passwords
To solve the lab, we enumerate a valid username, brute-force this user's password, then access their account page.
▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬
Buy my course: https://academy.ranakhalil.com/p/web-security-academy-video-series
▬ ? Links ? ▬▬▬▬▬▬▬▬▬▬
Notes.txt document: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/broken-authentication/lab-01/notes.txt
Web Security Academy Lab Exercise: https://portswigger.net/web-security/authentication/password-based/lab-username-enumeration-via-different-responses
Rana's Twitter account: https://twitter.com/rana__khalil
Рекомендуемые видео



















