On Fri, Feb 12, 2010 at 2:00 PM, <[email protected]> wrote: > I do svn up. The new code works fine with form and POST var (I tested it) > but has false positives, example: > > Found authentication credentials to: "http://127.0.0.1/chek/index.php". The > correct password is: "vetal". This vulnerability was found in the request > with id > 100. > POST http://127.0.0.1/chek/index.php with data: "passwd=123p4ss" returned > HTTP code "200" - id: 101 > No grep for : http://127.0.0.1/chek/index.php , the plugin sent > grepResult=False. > POST http://127.0.0.1/chek/index.php with data: "passwd=1q2w3e" returned > HTTP code "200" - id: 102 > No grep for : http://127.0.0.1/chek/index.php , the plugin sent > grepResult=False. > Found authentication credentials to: "http://127.0.0.1/chek/index.php". The > correct password is: "1q2w3e". This vulnerability was found in the request > with id > 102. > POST http://127.0.0.1/chek/index.php with data: "passwd=passwd" returned > HTTP code "200" - id: 103 > No grep for : http://127.0.0.1/chek/index.php , the plugin sent > grepResult=False. > Found authentication credentials to: "http://127.0.0.1/chek/index.php". The > correct password is: "passwd". This vulnerability was found in the request > with id > 103. > POST http://127.0.0.1/chek/index.php with data: "passwd=a5dd5a" returned > HTTP code "200" - id: 104 > No grep for : http://127.0.0.1/chek/index.php , the plugin sent > grepResult=False. > Found authentication credentials to: "http://127.0.0.1chek/index.php". The > correct password is: "a5dd5a". This vulnerability was found in the request > with id 104. > > The real password is: vetal
Kind of late, but I created a Trac ticket for this bug :) https://sourceforge.net/apps/trac/w3af/ticket/160065 > And not works if the form is with GET and: > > index.php with password field and when submit this, redirects to > check_password.php?password= > > In this case. w3af try index.php?password= and not > check_password.php?password= > > I don't know if I explained well ... my English is bad. Sorry. > > Thanks! > > 2010/2/12 Andres Riancho <[email protected]> >> >> On Fri, Feb 12, 2010 at 12:16 PM, <[email protected]> wrote: >> > wow! >> > >> > Thanks Andres!! I'll wait! >> >> Ok, it took me more than expected, but I was able to do it. Please >> perform a "svn up" in order to get the new code that supports password >> only form bruteforcing. If you find any bugs, please let me know. >> >> Thanks, >> >> > >> > 2010/2/12 Andres Riancho <[email protected]> >> >> >> >> null0xff0x00, >> >> >> >> I'm working on a login bruteforcer that supports password only forms >> >> right now. If you wait 10 more mins you'll be able to perform a "svn >> >> up" and get the new feature. >> >> >> >> Thanks, >> >> >> >> On Fri, Feb 12, 2010 at 11:53 AM, <[email protected]> wrote: >> >> > Solved! >> >> > >> >> > I use http fuzzer and works... Thanks. >> >> > >> >> > 2010/2/12 <[email protected]> >> >> >> >> >> >> Hello!! >> >> >> >> >> >> I am setting w3af for formAuthBrute but not working. The form only >> >> >> has >> >> >> a >> >> >> password box and w3af detects it... but doesn't the brute force >> >> >> attack: >> >> >> The >> >> >> configuration of formAuthBrute is default and the output is this: >> >> >> >> >> >> The page language is: en >> >> >> Starting formAuthBrute plugin execution. >> >> >> http://192.168.100.10/index.php detected a form with a password >> >> >> field >> >> >> and >> >> >> no username field. >> >> >> http://192.168.100.10/index.php detected a form with a password >> >> >> field >> >> >> and >> >> >> no username field. >> >> >> Found 1 URLs and 2 different points of injection. >> >> >> The list of URLs is: >> >> >> - http://192.168.100.10/index.php >> >> >> The list of fuzzable requests is: >> >> >> - http://192.168.100.10/index.php | Method: GET >> >> >> - http://192.168.100.10/index.php | Method: GET | Parameters: >> >> >> (password="") >> >> >> Password profiling TOP 100: >> >> >> - [1] enable with 1 repetitions. >> >> >> - [2] JavaScript with 1 repetitions. >> >> >> - [3] turned with 1 repetitions. >> >> >> - [4] auth with 1 repetitions. >> >> >> - [5] Your with 1 repetitions. >> >> >> - [6] enter with 1 repetitions. >> >> >> - [7] your with 1 repetitions. >> >> >> Finished scanning process. >> >> >> >> >> >> Thanks for help! >> >> >> -- >> >> >> - Null >> >> > >> >> > >> >> > >> >> > -- >> >> > - Null >> >> > >> >> > >> >> > ------------------------------------------------------------------------------ >> >> > SOLARIS 10 is the OS for Data Centers - provides features such as >> >> > DTrace, >> >> > Predictive Self Healing and Award Winning ZFS. Get Solaris 10 NOW >> >> > http://p.sf.net/sfu/solaris-dev2dev >> >> > _______________________________________________ >> >> > W3af-users mailing list >> >> > [email protected] >> >> > https://lists.sourceforge.net/lists/listinfo/w3af-users >> >> > >> >> > >> >> >> >> >> >> >> >> -- >> >> Andrés Riancho >> >> Founder, Bonsai - Information Security >> >> http://www.bonsai-sec.com/ >> >> http://w3af.sf.net/ >> > >> > >> > >> > -- >> > - Null >> > Sent from Barcelona, Spain >> >> >> >> -- >> Andrés Riancho >> Founder, Bonsai - Information Security >> http://www.bonsai-sec.com/ >> http://w3af.sf.net/ > > > > -- > - Null > -- Andrés Riancho Founder, Bonsai - Information Security http://www.bonsai-sec.com/ http://w3af.sf.net/ ------------------------------------------------------------------------------ This SF.net email is sponsored by Make an app they can't live without Enter the BlackBerry Developer Challenge http://p.sf.net/sfu/RIM-dev2dev _______________________________________________ W3af-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/w3af-users
