• XSS.stack #1 – первый литературный журнал от юзеров форума

Custom coded anti-brute forcing methods.

NullSafe

ripper
КИДАЛА
Регистрация
04.06.2021
Сообщения
14
Реакции
7
Пожалуйста, обратите внимание, что пользователь заблокирован
What I try to do on the back-end is to limited the available attempts for a specific username. Also limiting attempts per IP. I also randomize the input "names" for every page load to make it harder. On top of that implementing a completely custom captcha. This usually does the trick for me when facing larger traffic.

I am interested to see what methods you use on back-end to secure your logins?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Is this really an overkill when you get a huge traffic and extreme loads of brute attempts? This method have mostly stopped attackers right in their tracks, but there are still attempts.

I was thinking to apply limits to the server responses, like you know many bruters look for "200" Response. I am thinking to make both, fail and success to return the same, just with different payload to so say.
 
If you want to annoy your users with captchas, it's your right.
Limits to the server responses? This is complete nonsense. First, you can't limit it because it's
a response, not a request and it will be completely useless to change the server side logic.

Only file/directory bruting tools like DirBuster of wfuzz look for 200/404 responses. How common
is this compared to legitimate traffic? You will only create too many false positives.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх