...

/

Searching for Weak Credentials

Searching for Weak Credentials

Learn to implement a credential stuffing tool by performing POST requests to a login page.

Introduction

Vulnerability scanners can work in two different ways. One option is to identify the programs that are running on a system and then look up CVEs for those vulnerabilities. The other option is to search for common vulnerabilities that may exist in an application but don’t have an associated CVE.

We’ll be focusing on this second option. After identifying a vulnerability to exploit, we can craft exploit packets and automate the process of searching for systems that contain the vulnerability.

Looking for common errors

A vulnerability scanner can look for known or ...