AUTHENTICATION BYPASS

Authentication Bypassing is the act of getting past methods of authentication to access content that otherwise would not be available. This can be done in a variety of ways, including brute forcing passwords, flaws in logic and cookie tampering.


Username enumeration is a useful first step when trying to find vulnerabilities with authentication. Manually entering usernames on a sign in form can be great way to find out the limitations for usernames (eg. no capital letters or numbers) and if usernames have already been created. 

Tools such as ffuf can be used to enumerate for usernames using a wordlist of common usernames as per the example below.



Brute Force is an automated process of using commonly used words against known username(s). From the enumeration stage, I have multiple valid usernames and I will use fuff and a list of common passwords to try and brute force a log in.



Logic Flaw is when the typical path of a website can be bypassed, circumvented or manipulated. This can be beneficial for a penetration tester as they may be able to bypass a log in page and view content only intended for registered users, for example.


Cookie Tampering is the process of examining and editing cookies set by the web server during an online session. This has the potential to gain unauthenticated access, access to another users account or elevated privileges.

In the example below, the cookies were shown in plain text and could be edited using curl. In this case I was able to set the user type to admin and log the user in.


Sometimes cookies will be displayed as a hash, which are an irreversible representation of the original text. However the same output will be displayed every time, so the hashed cookie can be compared against databases such as  https://crackstation.net/ to check for their original strings.

Cookies can also be encoded, which can be reversed in order to get the original string. Once I have the original encoding type, I can edit the cookies by using the same encoding type (eg. base64) to encode my own strings and changing cookie values.

Comments

Popular posts from this blog

BURPSUITE IN-DEPTH

CROSS-SITE SCRIPTING

NMAP ADVANCED SCANS