top of page

Approach towards testing a login page, reset password/verify email

  • Nov 18, 2024
  • 1 min read

Following test cases can be applied on the Login page:

  • Bruteforce the login using cluster bomb attack. (both username / password)

  • Use known credentials / Default credentials (admin/admin/password/admin@123/p@@sw0rd etc)

  • Use response manipulation to change response codes ex: 403 to 200 or 403 to 301 / response body / response parameters ex: success:false to success:true)

  • Use forced browsing ex: visit the urls accessible after authentication, /dashboard, /profile etc

  • Use SQLi to bypass the authentication

 Following test cases can be applied on the password reset page:

  • Check if the password reset endpoint has rate limit enabled

  • Check if the password reset link is predictable

  • Use burp intruder to send multiple password reset links by giving a max thread value

  • Change the username or email parameter value in the request of password reset/verify email to victim’s email / password

  • Replace the link of password reset/verify email sent on victim with that of attacker

Recent Posts

See All

Comments


Commenting on this post isn't available anymore. Contact the site owner for more info.
bottom of page