How to Brute Force Any Website Login Page using Burpsuite πŸ‘©β€πŸ’»

What is Brute Force?

A BRUTE FORCE ATTACK IS A TRIAL-AND-ERROR METHOD, USED TO OBTAIN INFORMATION SUCH AS A USER PASSWORD OR PERSONAL IDENTIFICATION NUMBER (PIN). IN A BRUTE FORCE ATTACK , AUTOMATED SOFTWARE IS USED TO GENERATE A LARGE NUMBER OF CONSECUTIVE GUESSES AS TO THE VALUE OF THE DESIRED DATA.

This attack is hugely dependent on system resources and computing power. An attack of this nature can time and resource consuming , and the success of these attacks depends on the number of combinates that can be made, rather than the number of login attempts.

Counter Measures:-

The following measures can be used to defend against brute force attacks:

  • Requiring users to create complex passwords
  • Limiting the number of times a user can unsuccessfully attempt to log in
  • Temporarily locking out users who exceed the specified maximum number of failed login attempts

Let’s get started…

What do we need?

So to get started we need somethings ready.

You need to have Burp Suite installed and configured on your system. You can read this article to get started how to setup Burp Suite.

HOW TO SETUP BURP SUITE THE EASY WAY

And the second most important thing that you need is a testing lab. You should always consider creating a testing lab before doing anything else so in this case, I am using Metasploitable 2.

Here is the video showing all the steps in full detail.

After you have done that now we can actually start the process.

Step#1:

Run Metasploitable 2 virtual machine

Open the open Metasploitable 2 IP in your browser and then select DVWA

and you will see the login page right after you click on DVWA

Now we are ready and we will start the brute force attack.

Step#2:

Now we will open burp suite and change browser proxy setting to burps proxy.

Now as the proxy is set up let’s move on to the next step.

Step#3

Now go back to the Metasploitable tab and log in to DVWA with username = admin and password = password . In the burp, the site makes sure the Proxy is intercepting the requests.

And when you will click on login you will see something like this.

Here click on β€œ Brute force β€œ.

Now enter any random username and password and click on login and you will get the login request in the interceptor.

You can see the requests over here as the username and password are sent in the post request.

Right click on the request and click on β€œ Send to Intruder β€œ.

Step#4:

Now go to intruder tab and click on β€œ Positions ” tab, and then click on clear.

Select username and password paraments and then click on add.

And from the Attack type select β€œ Cluster Bomb ” what will this do is select one username from your wordlist and try all other words as password for that username.

Step#5:

Now click on β€œ Payloads ” and change the β€œ Payload Set ” from 1 to 2.

After that, you need to import your brute force wordlist that you will use to brute force. So in β€œ Payload Options ” click on β€œ Load ”

Step#6:

Now all you need to do is click on β€œ Start Attack β€œ.

You can see that total words in my wordlist are 19 and as we have selected Cluster Bomb 50,176 request will be made. For example, everyone Username will have 19 password tries so 19*19= 361 .

Now we will wait.

And if the password is wrong you can see it in the response β€œ Username and/or password incorrect ”

And to confirm it from the response as it will be β€œWelcome to the password protected area admin” :partying_face:

Thats how you do it :cocktail:

13 Likes

Cool stuff :+1:, Thanks

2 Likes