Enumeration & Brute Force: TryHackMe Writeup

Ansul Kotadia
2 min readJul 31, 2024

--

This room teaches enumeration and brute force authentication mechanisms.

Task 1: Introduction

No answer needed.

Task 2: Authentication Enumeration

#2.1 Which feature, if poorly implemented, can assist attackers in gathering valid usernames through its response differences?

Answer: Password reset

#2.2 What type of error messages can unintentionally provide attackers with confirmation of valid usernames?

Answer: Verbose errors

Task 3: Enumerating Users via Verbose Errors

#3.1 What is the valid email address from the list?

Answer: canderson@gmail.com

Task 4: Exploiting Vulnerable Password Reset Logic

#4.1 What is the flag?

Answer: THM{50_pr3d1ct4BL333!!}

Task 5: Exploiting HTTP Basic Authentication

#5.1 What is the flag?

Answer: THM{b4$$1C_AuTTHHH}

#5.2 Try using Hydra instead of Burp to brute force the password.

No answer needed.

Task 6: OSINT

#6.1 Click me to proceed to the next task.

No answer needed.

Task 7: Conclusion

#7.1 I can now attack authentication forms!

No answer needed.

The room explores various aspects of enumeration and brute force attacks on web applications, equipping us with the knowledge and practical skills needed to conduct thorough security assessments.

Key Takeaways

Effective Enumeration: Proper enumeration is crucial for identifying potential vulnerabilities in web applications. Using the right tools and techniques can reveal valuable information that aids in planning further attacks.

Brute Force Efficiency: Optimizing brute force attacks involves creating intelligent wordlists, managing attack parameters, and avoiding detection mechanisms like rate limiting and account lockout.

Ethical Responsibility: Always conduct enumeration and brute force attacks with explicit permission from the system owner. Unauthorized attacks are illegal and can have severe consequences.

--

--

No responses yet