★ ★ ★ Login Amy (Sensitive Data Exposure)

Поділитися
Вставка
  • Опубліковано 31 січ 2025

КОМЕНТАРІ • 15

  • @ritubanerjee5061
    @ritubanerjee5061 Рік тому

    This is truly a brilliant solution! I haven't downloaded the script, but you can display a suitable message and terminate the loop as soon as you get a 200 response (instead of 401) from the server.

  • @eliasbergmann20
    @eliasbergmann20 Рік тому

    Alternatively, I just checked the Github and found the password there, but your solution was way cooler to learn.

  • @iljasirosh683
    @iljasirosh683 4 роки тому +2

    Another way of solving it would be just generating list of potential passwords, then using md5sum on each of them and comparing results to the md5 hash of Amy's password (taken from the database).

    • @Hacksplained
      @Hacksplained  4 роки тому

      Yeap, Juice Shop often times offers multiple solutions, which is awesome!!

  • @mohammadaurangzaib5622
    @mohammadaurangzaib5622 4 роки тому

    First viewer

  • @tanercoder1915
    @tanercoder1915 4 роки тому

    this is great that you brought python to solve this challenge. unexpected! did you try turbo intruder in Burp? it's a free add-on and also uses python. it allows to do faster bruteforcing without throttling requests right inside Burp.

    • @Hacksplained
      @Hacksplained  4 роки тому +1

      Haha, why unexpected?
      :)
      I have not thought of Turbo Intruder to be honest. I was actually thinking that Turbo Intruder is Burp Pro only, but I have just checked, it's not. Will definitely incorporate it into my videos next time!!

    • @tanercoder1915
      @tanercoder1915 4 роки тому

      i'll try to look up your code. not familiar with async, just requests. and also please provide the solution sometime later too.

    • @Hacksplained
      @Hacksplained  4 роки тому

      @@tanercoder1915 sure will do :) Will wait a bit first for a couple of folks to answer.

    • @iamwaseem99
      @iamwaseem99 4 роки тому +1

      @@tanercoder1915 @Hacksplained I've updated the solution in gist, check it out. gist.github.com/pascalschulz/e4952c1961cd068d94b81c361fc2514a#gistcomment-3356442

    • @alanrens2392
      @alanrens2392 3 роки тому

      Hot