Lab: Username enumeration via different responses
Introduction: When it comes to web application security testing, understanding the intricacies of Burp Suite and its various modules is crucial. In this article, we'll explore a step-by-step approach to password enumeration using Burp Intruder, a powerful feature of the Burp Suite toolkit.
Step 1: Initial Investigation With Burp Suite running, start by investigating the login page of the target application. Submit an invalid username and password to initiate the process.
Step 2: Analyzing HTTP History Navigate to Proxy > HTTP history in Burp and locate the POST /login request. Highlight the value of the username parameter and send it to Burp Intruder.
Step 3: Configuring Burp Intruder Inside Burp Intruder, go to the Positions tab. Notice that the username parameter is automatically set as a payload position, indicated by two § symbols. Ensure the Sniper attack type is selected.
Step 4: Payload Configuration On the Payloads tab, select the Simple list payload type. Paste the list of candidate usernames under Payload settings. Click Start attack, and a new window will open.
Step 5: Analyzing Results After the attack is complete, examine the Results tab and sort by the Length column. Identify the entry with a longer response, indicating a potential successful login. Note the username in the Payload column.
Step 6: Refining the Attack Close the attack, return to the Positions tab, and clear the settings. Replace the username parameter with the identified username and add a payload position for the password parameter.
The updated payload configuration should look like this:
username=identified-user&password=§invalid-password§
On the Payloads tab, clear the list of usernames, replace it with the list of candidate passwords, and click Start attack.
Step 7: Identifying Successful Login After the attack, inspect the Status column. Look for a response with a 302 status code, indicating a successful login attempt. Note the password in the Payload column.
Step 8: Logging In Use the identified username and password to log in to the target application. Access the user account page to confirm the successful resolution of the lab.
Note: Efficient Enumeration While it's possible to brute-force the login using a single cluster bomb attack, the tutorial emphasizes the efficiency of enumerating a valid username first. This method ensures a more targeted and effective approach to password enumeration.
Conclusion: Mastering Burp Intruder is a valuable skill in the realm of web security testing. This tutorial provides a practical walkthrough of password enumeration using Burp Intruder, showcasing how this tool can be harnessed to identify valid usernames and passwords efficiently. As always, conduct security testing responsibly and within the bounds of ethical guidelines.
Reference:
Lab: Username enumeration via different responses | Web Security Academy (portswigger.net)
Subscribe to my newsletter
Read articles from Joel O. directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
Joel O.
Joel O.
A passionate cybersecurity enthusiast and cloud aficionado. I am on a mission to unravel the complexities of the ever-evolving cyber landscape and guide you through the vast expanse of cloud technology. As a cybersecurity professional, I bring a wealth of experience in securing digital ecosystems and defending against cyber threats. My journey in the cloud realm has been both thrilling and enlightening, and I am here to share my insights, discoveries, and practical tips with you. In these virtual pages, expect a fusion of in-depth cybersecurity analyses and explorations into the limitless possibilities of cloud computing and cybersecurity. Whether you're a seasoned cybersecurity professional, a cloud enthusiast, or someone just stepping into the digital frontier, there's something here for you.