Python - Ratelimiting
Last updated
Last updated
Now that the app is running let's go hacking!
The application shows a admin login form, but we don't have the credentials, we'll have to somehow login inorder to solve the challenge, the name of the challenge is 'Ratelimiting', from that we know that we need to bruteforce login, but what would be the username?
Let's do more investigation, upon viewing the source code, there is a base64 message commented out there.
We are going to decrypt the base64 encoded string using terminal as shown in the below image.
From this, it seems that the developer has an account with username devteam, so we probably need to bruteforce into that =) Client, rockyou? Are we referring to the rockyou wordlist?
Rockyou Wordlist - https://github.com/danielmiessler/SecLists/blob/master/Passwords/Leaked-Databases/rockyou-20.txt
So we'll have to bruteforce the login form which is post based using some tool, I prefer hydra & burp suite's intruder to do this, in this writeup, i'll demonstrate this using hydra.
Bruteforcing using Hydra
After you launch a bruteforce attack against the login function, after several minutes, you'll get the password like the below screenshot.
Please refer to the OWASP's guide for protecting against such type of bruteforce attacks which happens because ratelimiting is not set.