Information Security Asked by Riccardo D on February 13, 2021
is there any way for hydra to understand the correct combination ^USER^ and ^PASS^ in a http-post-form authentication attack based on the length of the body response?
Like in Burpsuite you can look at the length and understand password and username.
So basically how can I setup hydra to look at the length parameter during a http-post-form?
I'm not sure if this is possible to do with Hydra, but I would recommend using ffuf for this.
You can do an HTTP-POST form bruteforce based on length like this:
ffuf -w /path/to/wordlist.txt -X POST -d "username=admin&password=FUZZ" -u https://target/login.php -fl 480
-fl
: tells it to filter out the length you don't want (failed attempt)
FUZZ
: is where it will replace words from the wordlist in the request
Although in this approach the username would be static. A little bash scripting hack would solve that.
Answered by Khalid on February 13, 2021
2 Asked on December 10, 2021 by geo-m
0 Asked on December 10, 2021
3 Asked on December 8, 2021 by ddbe
1 Asked on December 8, 2021 by dipesh-sunrait
2 Asked on December 4, 2021 by loopofnegligence
1 Asked on December 4, 2021
5 Asked on December 2, 2021 by askford
6 Asked on December 2, 2021
3 Asked on November 30, 2021 by iancool
3 Asked on November 30, 2021 by brad-stevanus
1 Asked on November 30, 2021 by houtanf
1 Asked on November 28, 2021
10 Asked on November 25, 2021 by lil-bits
1 Asked on November 25, 2021
2 Asked on November 23, 2021
0 Asked on November 23, 2021 by gilad-naaman
Get help from others!
Recent Answers
Recent Questions
© 2023 AnswerBun.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP