Broken brute-force protection, multiple credentials per request
Lab Description

Walkthrough
Step 1: Analyzing the Behavior
After logging in with the provided credentials (wiener:peter
), I attempted to brute-force the login by iterating through the candidate passwords. However, I encountered an account lockout message, indicating a brute-force protection mechanism was in place.

Upon inspecting the login request in Burp Suite, I noticed that the username
and password
were sent in JSON format:
This hinted that the server might accept an array of passwords instead of a single password.

Step 2: Bypassing the Protection
To exploit this vulnerability:
I modified the
password
field to include an array of candidate passwords:
The server responded with a 302 Found
, redirecting me to Carlos's account. This confirmed that one of the passwords in the array was correct, and the system did not block the request due to brute-force protection.

Step 3: Verifying the Password
Since the exact password was not revealed in the response:
I forwarded the request to the browser using Burp Suite's "Request in browser in original session" feature.
I logged in successfully to Carlos's account.

Last updated
Was this helpful?