What I know and tried:
*2 account discovered from support page
*the cookie is hashed and encoded but when I tried to do fixation of the cookie, it results to error (as the image above)
*find password as matches the criteria of password grep '^[[:upper:]]' /usr/share/wordlists/rockyou.txt | grep '[[:lower:]]' | grep '[[:digit:]]$' | grep '[[:punct:]]' | grep -E '^.{20,}$'
*use the matched passwords to bruteforce (with rate limit) the 2 account found. But doesn’t work.
My questions:
*Should I use dirb to bust directories to find the admin panel ?
*Would I be able to find admin panel when I am not logged in?
*Should I use X-Forwarded-For ? I tried but doesn’t work either.
Our other accounts remain unchanged, you can continue to contact any department by adding your country code as usual.
Should I permutate the short-username list with _country or country codes?
there is a page where you can write a message to (existing) users. This could be suitable for your preferred approach.
if you still need help, feel free to contact me via dm
import itertools
import numpy
# file that contain user:pass
userpass_file = "country_codes.txt"
# file that contain user:pass
userpass_file1 = "top-usernames-shortlist.txt"
output = []
with open(userpass_file1, "r") as fh1:
for fline1 in fh1:
with open(userpass_file, "r") as fh:
for fline in fh:
fline = fline.strip()
concatUser = fline1.strip() + fline.strip()
output.append(concatUser)
output = numpy.array(output)
print(output)
with open("shortlist_permutation_country_codes.txt", "w") as outfile:
outfile.write("\n".join(output))
i tried this permuation, even with underscore username( _ )countryCode but still doesnt work.
I cant find any other users aside from guest and support
my hunch are correct except on the way of my permutation.
I just need to correct the syntax of permutation. Read the “Usernames” section again, you will get hint from there on the correct syntax. You will get a lot more usernames aside from the 2 usernames you already got. And also, use the rockyou.txt then narrow down the possible passwords as per password policy.
Ok I modified the script for the different cc for admin now I’m going to run it. The hardest part was modifying the script because I was overthinking the submit part smh!