Skip to content

Latest commit

 

History

History
95 lines (53 loc) · 2.32 KB

Medium.md

File metadata and controls

95 lines (53 loc) · 2.32 KB

DVWA - Bruteforce - Medium

Set Up Burp Suite

Start a new temp project in Burp Suite.

We will be using Burp Suite Browser.

  1. Click on Proxy.
  2. Under Proxy click Intercept.
  3. Now click on Open Browser.
  4. Enter the IP Address of the DVWA Virtual Machine.

1692543303765

now you have this site.

Login

Username: admin

Password: password

1692543445399

Set up for this challenge

  1. Go to DVWA Security.1692543564250
  2. Now Select medium in the drop down menu and submit. You get the following alert. 1692629593010
  3. For confirmation on bottom left side you can check. 1692629630565
  4. Now click on Brute Force.

1692543990678

Now Lets Start with the attack.

Now in burpsuite, click on Intercept is off to turn the intercept on.

Try entering the username admin and password pass and login.

1692629703676

Now lets send this information to Intruder.

Click on Action then Send to Intruder or Press Ctrl + i.

1692629755235

select pass and click on add.

1692544546600

now we have set pass as the variable.

Setting Up the Payload

Go to Intuder -> Payloads

In payload settings, lets load up this file from SecLists.

Click on load then goto the location of the file and select the file.

After Setup You get this

1692547116563

Final Step

Go to Intruder -> Settings -> Grep Match

Clear all and add incorrect and Incorrect to the list.

1692547274335

Now start the attack.

Results

1692629872251

We can see changes in the row 2 in length and incorrect.

So we searched for incorrect passwords so all incorrect passwords are marked 1

the the password for admin user is password.

The only problem faced was, there is a dely of 2 seconds.

Simmilarly there are few other users in the database their passwords are

  • admin:password
  • 1337:charley
  • gordonb:abc123
  • Pablo:letmein
  • Smithy:password