Rate Limiting
Last updated
Was this helpful?
Last updated
Was this helpful?
Without rate-limiting, services can be vulnerable to abuse, such as brute force attacks or denial-of-service (DoS) attacks, where excessive requests can overwhelm and disrupt the service.
Implement rate-limiting policies to restrict the number of requests per user or IP address, use adaptive limits based on user behavior, and employ CAPTCHA or other verification methods to detect and mitigate automated abuse.
The example below is based on PostSwigger's lab.
Next, we need to find which of these headers is tracked by the server. This can be achieved via trial and error (Figure 3).
If we try a Pitchfork BFA attack with the creds test:test
we can't really infer anything (Figure 4).
The test
password is too simple, so it does not take much time to get processed, hashed and compared within the database. A nice schematic of what is happening behind the scenes can be found below (Figure 5).
If we repeat the Pitchfork attack with a complex password, something stands out (Figure 6).
Now that we have a valid username to use, we can perform a similar-type attack to get the password (Figure 7).
We can try spoofing our IP address by using the headers from Alex's (Figure 2).