Testing for Default Credentials
In this recipe, we will go over how to test an application for default credentials. Often, newly provisioned applications, servers, routers, hosts, and so on come with default passwords for system administrators to log in and configure. If these are left as defaults, when attackers run brute-force attacks, the likelihood of a successful login is higher. We will go through how to conduct a simple brute-force attack using a wordlist.
Getting ready
To prepare for this recipe, please start ZAP and OWASP Juice Shop. Make sure that ZAP intercepts traffic at the OWASP Juice Shop application home page. In addition, you will need to create an account in OWASP Juice Shop using any dummy email, but ensure that the password is password
for this section. In addition, obtain the password-cracking wordlist ('top-passwords-shortlist'
) from GitHub or a Google search.
How to do it…
- Intercept the traffic, then log in to the application...