Attacking Basic Auth With Burp Suiteâ (Session 1)
Attacking Basic Auth With Burp Suiteâ (Session 1)
URL https://attackdefense.com/challengedetails?cid=1896
Important Note: This document illustrates all the important steps required to complete this lab.
This is by no means a comprehensive step-by-step solution for this exercise. This is only
provided as a reference to various commands needed to complete this exercise and for your
further research on this topic. Also, note that the IP addresses and domain names might be
different in your lab.
Command: ifconfig
The IP address of the host machine is 192.253.50.2
We have discovered that HTTP and MYSQL services are running on the target machine.
Step 3: Checking the application available on port 80 of the target machine.
URL: http://192.253.50.3
bWAPP application is hosted on the target machine.
URL: http://192.253.50.3/basic
Enter some random username - password combination.
Since the credentials were incorrect, the same login prompt would appear again:
Notice that Burp window comes into focus as it has intercepted the request.
Notice that the Proxy button in Burp Suite lit up (orange).
Intercepted request:
Notice the Authorization header. The “/basic” directory uses Basic Auth.
So, now “admin:” would be appended to each password from the list.
This would start the dictionary attack against the target webapp:
Check the Status codes of the requests and check the payload for the request with a different
status code:
Notice that there is one request with the status code of 301.
Click OK
Flag: d25db4ce54b60b49dfd7b32c52ed8d26
References: