Search

Attacking Other Portals

Burp Suite:

  1. Go into Target > Scope
  2. Add tesla.com (or whatever your target)
  3. Under Site map, you get the website and subdomains.
  4. Under Proxy > Options
  5. Check Is in target scope for request and response
  6. Turn intercept on
  7. Test a login and send the result to Repeater or Intruder
  8. Grab the fail/error message
  9. Go to Intruder > Options > Grep - Match
  10. recognize
  11. Set the correct positions
    1. If you already know an email is valid and wanna test passwords, clear positions, then add password field only
  12. Payload Sniper attack:
    1. Winter24!
    2. Tesla123!
    3. Password1!
    4. Winter2024!
  13. If Grep doesn’t work, you can check status message (200 vs 302)
    1. If it does, you can sort by check marks
    2. If it doesn’t you can sort by status code. The first request it hits that number is the real success login
    3. Length difference

Payload Pitchfork Attack:

tests user 1 with pass 1

user 2 with pass 2

**Good for a combolist of different accounts in that organization for password reuse.

  1. payload set 1 (simple list)
    1. Add emails for targets
  2. payload set 2 (simple list)
    1. Add the passwords you wanna try (like from the sniper attack)

Payload Clusterbomb Attack (Password Spraying):

tests user 1 with all passwords

Good for testing lazy/easy to remember passwords on a few verified/valid users

  1. Same setup as Pitchfork^^

If you start seeing errors, stop the attack. Don’t lock out people from their accounts.