Web Hacking
◾
323
That’s pretty much it; from the “Intruder” tab, you would click on “Start Attack,” and
it would try all possible combinations of alphanumeric charset
up to a maximum character
length of 4.
Attacking HTTP Basic Auth
The method for attacking an HTTP basic authentication would be different, since we need to send
a base64-encoded payload, which the server could decode and compare with the .htpasswd file.
324
◾
Ethical Hacking and Penetration Testing Guide
Also, the username and the password that would be encoded and sent to the server should be
separated by colon for our attack to work.
Step 1
—We will start by intercepting the authentication, and then send it to burp intruder.
Step 2
—Again,
by default, burp intruder would pinpoint the possible positions to be brute-
forced; however, we are interested in attacking only the authorization header that would be
sent
to the server, so we would click the “Add” button to lock the position.
Web Hacking
◾
325
Step 3
—The next step would be to define the usernames that would be used to brute force. We
would choose the payload type to
custom iterator
so we can add our separator and add the
usernames that we want to test. Also, in the “Separator for Position 1,” we will add a colon.
Step 4
—Next, we would need to select the password that we are
testing the usernames against;
for that, we select number “2” from the drop-down menu holding the name “positions.”
326
◾
Ethical Hacking and Penetration Testing Guide
Step 5
—Finally, we need to encode our payload with base64 encoding, for which we need to
define a rule under the “Payload Processing” tab.
To add a rule, select rule type to “Encode”
and encoding type to “Base64-encode.”
That’s all you need to do for attacking http basic authentication.
Further Reading
◾
http://www.symantec.com/connect/blogs/top-500-worst-passwords-all-time.
◾
http://portswigger.net/burp/help/intruder_positions.html.
Dostları ilə paylaş: