Username enumeration via response timing

Walkthrough
Step 1: Initial Observations

Step 2: Capturing and Analyzing the Login Request
Step 3: Bypassing Rate Limiting


Step 4: Exploiting Timing Differences

Step 5: Configuring Burp Intruder



Step 6: Analyzing the Results

Step 7: Brute-Forcing the Password

Start the attack and observe the results.

Step 8: Validating the Results
PreviousUsername enumeration via subtly different responsesNextBroken Brute-Force Protection, IP Block
Last updated