Searching for Weak Credentials
Learn to implement a credential stuffing tool by performing POST requests to a login page.
We'll cover the following...
Introduction
Vulnerability scanners can work in two different ways. One option is to identify the programs that are running on a system and then look up CVEs for those vulnerabilities. The other option is to search for common vulnerabilities that may exist in an application but don’t have an associated CVE.
We’ll be focusing on this second option. After identifying a vulnerability to exploit, we can craft exploit packets and automate the process of searching for systems that contain the vulnerability.
Looking for common errors
A vulnerability scanner can look for known or ...