Lab: Brute-forcing a stay-logged-in cookie
Last updated
Last updated
we need to get access to user carlos
we will intercept the request and toggle the stay logged in button
here in sequencer we will validate the randomness of the cookies
if we see here in the character level analysis that it is pretty high
which means that we have a strong randomness in our cookies and it is not static
next we will test the stay logged in encoded
we can see here the character level analysis is red
which means that it is static and it is not changing every request
we back from the repeater and get the stay logged in token
it looks like a base64 thats why I used cyberchef
and i use hash identifer to see the exact hash algorithm that has been used
and it looks like its md5
now we will move on to the myaccount page
send to repeater
and try removing the ?id=wiener
and looks like it is still working without a parameter
send to intruder
first we have to set the payload processing since we have to encode the payload first
select md5 for the password
then add prefix so the payload will be like
then just encode the payload to base64
final result
lastly load the passwords
as we proceed with the attack
we can see the different length from the rest
md5 to text
final resutl