infosecgirls
Ctrlk
  • Introduction
  • Application Details
  • INITIAL SETUP WITH OWASP ZAP
    • OWASP ZAP
    • Setup OWASP ZAP
    • Modes
    • Automated Scan
    • Report Generation
  • Initial Setup with Burp
    • Start Burp Suite
    • Add FoxyProxy Addon
    • Add New Proxy In FoxyProxy
    • Configure Proxy Listener
    • Install Burp's CA Certificate In Firefox
    • Getting Rid of Unnecessary Browser Traffic
  • Quick Basics
    • Disable Intercept Mode in Burp
    • Enable Intercept Mode in Burp
    • Send to Repeater
    • Send to Comparer
  • Web Application Pentesting
    • A1 - Injection
    • A2 - Broken Authentication
    • A3 - Sensitive Data Exposure
    • A4 - XML External Entities (XXE)
    • A5 - Broken Access Control
    • A6 - Security Misconfiguration
    • A7 - Cross-Site Scripting (XSS)
    • A8 - Insecure Deserialization
    • A9 - Using Components with Known Vulnerabilities
    • 10 - Insufficient Logging & Monitoring
    • References
    • About Us
  • Additional Content
    • Insecure Direct Object Reference
    • Security Misconfiguration
    • Password Guessing Attack
    • User Enumeration
      • Unauthenticated User Access
      • Create a New User
      • Authenticated User Access
      • Intruder: Set Positions
      • Intruder: Define Payload
      • Intruder: Configure Grep - Extract
      • Trigger Attack & Save Results
    • Custom Iterator
    • Null Payload
    • Request in Browser: Privilege Escalation Check
  • Burp Extenders
    • Target
    • Proxy
    • Intruder
    • Repeater
    • Sequencer
    • Decoder
    • Comparer
    • Extender
Powered by GitBook
On this page

Was this helpful?

  1. Additional Content

User Enumeration

  • Unauthenticated User Access

  • Create a New User

  • Authenticated User Access

  • Intruder: Set Positions

  • Intruder: Define Payload

  • Intruder: Configure Grep - Extract

  • Trigger Attack & Save Results

PreviousPassword Guessing AttackNextUnauthenticated User Access

Last updated 5 years ago

Was this helpful?