Brute-forcing a stay-logged-in cookie
Lab Description
Walkthrough
Step 1: Initial Observations


Step 2: Analyzing the Token


Step 3: Targeting the Victim

Step 4: Automating the Attack

Step 5: Analyzing Results

Requesting in Browser (Original Session):
To verify the token and log in as Carlos, I selected the successful request with the 200 OK status code. Using Burp Suite's Request in Browser feature:


Step 6: Cracking Carlos's Password (For Confirmation)

Last updated