Post

PortSwigger - Authentication - Lab 9

Lab 9 - Brute-forcing a stay-logged-in cookie

Lab Objective:

This lab allows users to stay logged in even after they close their browser session. The cookie used to provide this functionality is vulnerable to brute-forcing.
To solve the lab, brute-force Carlos’s cookie to gain access to his “My account” page.

Your credentials: wiener:peter
Victim's username: carlos
Candidate passwords

Reference:
Port Swigger - Lab 9

Solution


3. Log out of your account.

6. Under Payload processing, add the following rules in order. These rules will be applied sequentially to each payload before the request is submitted.

- Hash: MD5
- Add prefix: wiener:
- Encode: Base64-encode

9. Make the following adjustments and then repeat this attack:

- Remove your own password from the payload list and add the list of candidate passwords instead.
- Change the Add prefix rule to add carlos: instead of wiener:

This post is licensed under CC BY 4.0 by the author.