{"id":783,"date":"2023-10-04T16:05:41","date_gmt":"2023-10-04T16:05:41","guid":{"rendered":"https:\/\/hacking.cool\/?p=783"},"modified":"2023-10-04T16:32:58","modified_gmt":"2023-10-04T16:32:58","slug":"the-art-of-website-login-hacking","status":"publish","type":"post","link":"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/","title":{"rendered":"Alternate Logins"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"937\" height=\"540\" src=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437.png\" alt=\"\" class=\"wp-image-790\" srcset=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437.png 937w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437-300x173.png 300w, https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437-768x443.png 768w\" sizes=\"auto, (max-width: 937px) 100vw, 937px\" \/><\/figure><\/div>\n\n\n<p class=\"has-black-color has-text-color\">When we browse a web site, the first thing we often notice is its login pages. The more amateur hacker may try to brute-force it right away. However, the more experienced tester will think: are there any other authentication points to the same resource? The answer is often resoundingly YES! <\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Modern applications often create alternative ways into the same resource. For instance alternatives vectors to the site functionality may be designed to be accessed from Mobile devices (like your smartphone), and these are usually done with the help of API endpoints. <\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">Web application may have various API endpoints that provides alternative login\/authentication capabilities instead of using the main login pages. This API endpoints are usually designed to be used as an interface for other programs. <\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">So remember: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Humans use button<\/li>\n\n\n\n<li>Programs use APIs<\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color\">In addition to APIs, there can be just full fledged pages that do the same login functions, however for other devices.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">So it stands to reason to scan the website for those API endpoints and other pages that could provide alternative shortcuts to the same login functions of the site. One such example (for wordpress sites) is the xmlrpc.php page.<\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">The benefits of finding alternative Login functions for the sites:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>While the main login pages may have all kinds of security restrictions, the alternative login functions may miss some or even all security restrictions. Often this is the case with multi-factor authentications, account lock-outs, request rate limiting and other restrictions placed on the main login but forgotten for its alternative authentication locations.<\/li>\n\n\n\n<li>The main login page is usually designed as an interface for humans. The alternative login pages, especially if they are designed for APIs for program use, may have other formats of interaction that allows to greatly increase the speed of brute-forcing.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color\">And that&#8217;s about it. Whenever you encounter a site with a login functionality, don&#8217;t be hasty into attacking it right away. Try looking for alternative, not so out in the open, login functionalities to the same resource.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we browse a web site, the first thing we often notice is its login pages. The more amateur hacker may try to brute-force it right away. However, the more experienced tester will think: are there any other authentication points to the same resource? The answer is often resoundingly YES! Modern applications often create alternative<span class=\"post-excerpt-end\">&hellip;<\/span><\/p>\n<p class=\"more-link\"><a href=\"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/\" class=\"themebutton\">Read More<\/a><\/p>\n","protected":false},"author":3,"featured_media":800,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-783","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Alternate Logins - hacking.cool<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Alternate Logins - hacking.cool\" \/>\n<meta property=\"og:description\" content=\"When we browse a web site, the first thing we often notice is its login pages. The more amateur hacker may try to brute-force it right away. However, the more experienced tester will think: are there any other authentication points to the same resource? The answer is often resoundingly YES! Modern applications often create alternative&hellip;Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"hacking.cool\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-04T16:05:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-04T16:32:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"937\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Atom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Atom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#website\",\"url\":\"https:\/\/hacking.cool\/atomanya\/\",\"name\":\"hacking.cool\",\"description\":\"is the hacking school \ud83d\udc69\ud83c\udffb\u200d\ud83d\udcbb\ud83e\uddd1\ud83c\udffb\u200d\ud83d\udcbb\ud83d\uddfa\ud83d\udcda\ud83d\udcd6\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hacking.cool\/atomanya\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/#primaryimage\",\"url\":\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437-1.png\",\"contentUrl\":\"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437-1.png\",\"width\":937,\"height\":540},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/\",\"url\":\"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/\",\"name\":\"Alternate Logins - hacking.cool\",\"isPartOf\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/#primaryimage\"},\"datePublished\":\"2023-10-04T16:05:41+00:00\",\"dateModified\":\"2023-10-04T16:32:58+00:00\",\"author\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2\"},\"breadcrumb\":{\"@id\":\"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hacking.cool\/atomanya\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alternate Logins\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2\",\"name\":\"Atom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g\",\"caption\":\"Atom\"},\"url\":\"https:\/\/hacking.cool\/atomanya\/author\/atom\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Alternate Logins - hacking.cool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/","og_locale":"en_US","og_type":"article","og_title":"Alternate Logins - hacking.cool","og_description":"When we browse a web site, the first thing we often notice is its login pages. The more amateur hacker may try to brute-force it right away. However, the more experienced tester will think: are there any other authentication points to the same resource? The answer is often resoundingly YES! Modern applications often create alternative&hellip;Read More","og_url":"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/","og_site_name":"hacking.cool","article_published_time":"2023-10-04T16:05:41+00:00","article_modified_time":"2023-10-04T16:32:58+00:00","og_image":[{"width":937,"height":540,"url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437-1.png","type":"image\/png"}],"author":"Atom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Atom","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/hacking.cool\/atomanya\/#website","url":"https:\/\/hacking.cool\/atomanya\/","name":"hacking.cool","description":"is the hacking school \ud83d\udc69\ud83c\udffb\u200d\ud83d\udcbb\ud83e\uddd1\ud83c\udffb\u200d\ud83d\udcbb\ud83d\uddfa\ud83d\udcda\ud83d\udcd6","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hacking.cool\/atomanya\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/#primaryimage","url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437-1.png","contentUrl":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437-1.png","width":937,"height":540},{"@type":"WebPage","@id":"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/","url":"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/","name":"Alternate Logins - hacking.cool","isPartOf":{"@id":"https:\/\/hacking.cool\/atomanya\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/#primaryimage"},"datePublished":"2023-10-04T16:05:41+00:00","dateModified":"2023-10-04T16:32:58+00:00","author":{"@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2"},"breadcrumb":{"@id":"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hacking.cool\/atomanya\/the-art-of-website-login-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hacking.cool\/atomanya\/"},{"@type":"ListItem","position":2,"name":"Alternate Logins"}]},{"@type":"Person","@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/804a839cfa61d89d69fb2cf1d2f0adc2","name":"Atom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hacking.cool\/atomanya\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac4d05ec7d617e7f2dee5855900a855a?s=96&d=mm&r=g","caption":"Atom"},"url":"https:\/\/hacking.cool\/atomanya\/author\/atom\/"}]}},"jetpack_featured_media_url":"https:\/\/hacking.cool\/atomanya\/wp-content\/uploads\/2023\/10\/Screenshot-2023-10-04-120437-1.png","_links":{"self":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/783","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/comments?post=783"}],"version-history":[{"count":7,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/783\/revisions"}],"predecessor-version":[{"id":807,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/posts\/783\/revisions\/807"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/media\/800"}],"wp:attachment":[{"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/media?parent=783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/categories?post=783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hacking.cool\/atomanya\/wp-json\/wp\/v2\/tags?post=783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}