banner
毅种循环

毅种循环

头顶铁锅接收宇宙能量

How to bypass authentication verification code

How to bypass authentication verification code#

0x01#

Encountered a login interface with a verification code in the project, and the authentication is performed using the UUID of the current verification code. In simple terms,

If you need to brute force the login interface, you need to recognize the verification code and carry the UUID of the current verification code at the same time to brute force, so that the interface can return information.

The style is as follows:

0X02#

UUID also has time verification

image

In the case of a normal UUID:

image

In the case of resending the packet:

image

The UUID here can have the following functions:

  1. Timestamp
  2. SIGN verification
  3. Verification code update

When brute forcing, there is an embarrassing problem. If it is directly imported into Burp, the UUID will not be updated, which means that the SIGN of each request is invalid.

0X03#

Solution:

captcha-killer comes with a solution

The regex is used to extract parameters such as tokens.

The regex needs to be extracted using regular expressions, as shown below:

image

Set it in the intrude module, and add the verification parameter @captcha-killer-modified@ in intruder.

Refer to the following:

image

The brute force echo can run correctly:

image

The log shows as follows:

image

image

Perfectly solve this problem.

Please refer to the above instructions for the tools used:
https://github.com/f0ng/captcha-killer-modified

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.