Skip to content

Commit 2bd5981

Browse files
Update users_enumuration.md
1 parent 4a64f3d commit 2bd5981

File tree

1 file changed

+13
-2
lines changed

1 file changed

+13
-2
lines changed

intro_hacking/5-api/walkthrough/users_enumuration.md

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
## User Enumuration
1+
## Users & Passwords Enumuration
22
User enumeration is a security testing technique used to discover valid usernames or user IDs within an application or system. It's done by observing slight but discernible differences in the system's responses when an attacker attempts to authenticate or interact with different user accounts.
33

44
## How User Enumeration Works
@@ -16,14 +16,25 @@ The core concept is to test a known input (a username or email) against a system
1616
---
1717

1818
## Exploit in VAmPI
19+
20+
### Users Enumuration
1921
- Register the following users: cyber_champion, quality_assurance, gov_il
2022
- Capture the login method in Burp
2123
- Send the request to Burp intruder using ctrl+i
2224
- Mark the user name and click the add button, this is going to be our variable
2325
- Go to the payload tab
2426
- Type different values and combine and users you created between them for example: aaaaa, bbbb, cccccc, cyber_champion ,eeeeee, quality_assurance, gov_il
2527
- Click the start attack button
26-
- What do you learn?
28+
- What do you learn?
29+
30+
### Passwords Enumuration
31+
- Now clear the variables in the intruder
32+
- Supply a user that exists in your system
33+
- Add the password as a variable
34+
- Go to the payload tab, clear the list and add a few options for passwords\
35+
- Start the attack
36+
- What do you learn?
2737

2838

2939

40+

0 commit comments

Comments
 (0)