Web application security - the fast guide 1.1 | Page 117

Chapter 6 - Attack execution (2) P a g e | 117 Figure 46: comparing requests with Burp E. Use an automation tool to iteratively try different user names and password. (Burp is an example) F. Monitor results and collect broken account information. G. Different messages can be a very good pointer that you did a bad guess the user name only or both credentials. 6.4 Password management exploit In many situation developers do not focus on protecting privileged pages from privileged users so the mistakes that are covered in main login page reappear in the change password, forget password or remember me option. Mistakes like allowing unlimited number of false login, providing different message depending on bad or valid password and checking the validity of password before matching with new password.