<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to run a brute force attack test on application username and password? in Security</title>
    <link>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238732#M6679</link>
    <description>&lt;P&gt;Here is the http traffic flow :&lt;/P&gt;

&lt;P&gt;1)&lt;A href="https://app-dev-001:443/"&gt;https://app-dev-001:443/&lt;/A&gt;&lt;BR /&gt;
2)&lt;A href="https://app-dev-001:443/en-US/"&gt;https://app-dev-001:443/en-US/&lt;/A&gt;&lt;BR /&gt;
3)&lt;A href="https://app-dev-001:443/en-US/account/login?return_to=%2Fen-US%2F"&gt;https://app-dev-001:443/en-US/account/login?return_to=%2Fen-US%2F&lt;/A&gt;&lt;BR /&gt;
4)&lt;A href="https://app-dev-001:443/en-US/account/login"&gt;https://app-dev-001:443/en-US/account/login&lt;/A&gt;   (This is POST request)&lt;BR /&gt;
5)&lt;A href="https://app-dev-001:443/en-US/app/launcher/"&gt;https://app-dev-001:443/en-US/app/launcher/&lt;/A&gt;&lt;BR /&gt;
6)&lt;A href="https://app-dev-001:443/en-US/app/launcher/home"&gt;https://app-dev-001:443/en-US/app/launcher/home&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Can you please provide any pointers/links about the "4)" request call  : &lt;A href="https://app-dev-001:443/en-US/account/login"&gt;https://app-dev-001:443/en-US/account/login&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Thu, 05 May 2016 14:32:10 GMT</pubDate>
    <dc:creator>amoldesai</dc:creator>
    <dc:date>2016-05-05T14:32:10Z</dc:date>
    <item>
      <title>How to run a brute force attack test on application username and password?</title>
      <link>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238727#M6674</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;We have a requirement from our security team to test the brute force attack scenario against user name and password of our application using THC Hydra password cracking tool&lt;/P&gt;

&lt;P&gt;We are using https ( default port 443) . Application url is of the form :  &lt;A href="https://hostname.com/en-US/app/appname"&gt;https://hostname.com/en-US/app/appname&lt;/A&gt;.&lt;BR /&gt;
Basically hydra tool takes a list of users and passwords from the input file and validate it against the application. We will also pass null user and passwords and see the behavior.&lt;/P&gt;

&lt;P&gt;Issue is I am not able to pass (use) the right url of the application containing user/password, hence the hydra tool always results in http "401" response even when I provide correct user name and password.&lt;/P&gt;

&lt;P&gt;To simply and debug the issue, I used the  Chrome REST Client(Postman,PostIT) and I get the same "http 401"  response. Following url was tried with REST Client tool. When we access the application, splunk prompts for user/password. Submitting the form uses the below url:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;1) URL : &lt;A href="https://hostname.com/en-US/account/login"&gt;https://hostname.com/en-US/account/login&lt;/A&gt;&lt;/STRONG&gt;&lt;BR /&gt;
   Method: POST&lt;BR /&gt;
   Params in body :username="xyz" and password="xyz"&lt;/P&gt;

&lt;P&gt;Response:Http 401&lt;/P&gt;

&lt;P&gt;My questions :&lt;/P&gt;

&lt;P&gt;a) Does Splunk require anything to successfully authorize the url:&lt;A href="https://hostname.com/en-US/account/login"&gt;https://hostname.com/en-US/account/login&lt;/A&gt;? Please let me know.&lt;/P&gt;

&lt;P&gt;b) Any other suggestion to run this test against our application url with user name and password.&lt;/P&gt;

&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2016 17:06:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238727#M6674</guid>
      <dc:creator>amoldesai</dc:creator>
      <dc:date>2016-05-04T17:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to run a brute force attack test on application username and password?</title>
      <link>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238728#M6675</link>
      <description>&lt;P&gt;According to my notes, the correct login URL for the REST API is &lt;A href="https://hostname.com:8089/services/auth/login"&gt;https://hostname.com:8089/services/auth/login&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2016 18:17:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238728#M6675</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2016-05-04T18:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to run a brute force attack test on application username and password?</title>
      <link>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238729#M6676</link>
      <description>&lt;P&gt;Thanks for your answer. I need to do brute force test against all the tcp service with open ports. There are two ports open  when splunk runs (used nmap tool):&lt;/P&gt;

&lt;P&gt;1) splunk web server port (443 in my case)&lt;BR /&gt;
2) Management port (8089).&lt;/P&gt;

&lt;P&gt;The url that you provided(with port 8089) will help me in testing the second case by passing along user name and password .&lt;/P&gt;

&lt;P&gt;Similarly, I am looking for a url for the first case wherein I can pass user name and password.&lt;/P&gt;

&lt;P&gt;Request your help here.&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 02:44:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238729#M6676</guid>
      <dc:creator>amoldesai</dc:creator>
      <dc:date>2016-05-05T02:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to run a brute force attack test on application username and password?</title>
      <link>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238730#M6677</link>
      <description>&lt;P&gt;Port 443 is the normal login port.  I suggest using your browser's debug feature to see what is sent when you login manually and then replicate that with your tester.&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 13:25:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238730#M6677</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2016-05-05T13:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to run a brute force attack test on application username and password?</title>
      <link>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238731#M6678</link>
      <description>&lt;P&gt;Here is the http traffic flow :&lt;/P&gt;

&lt;P&gt;1)&lt;A href="https://app-dev-001:443/"&gt;https://app-dev-001:443/&lt;/A&gt;&lt;BR /&gt;
2)&lt;A href="https://app-dev-001:443/en-US/"&gt;https://app-dev-001:443/en-US/&lt;/A&gt;&lt;BR /&gt;
3)&lt;A href="https://app-dev-001:443/en-US/account/login?return_to=%2Fen-US%2F"&gt;https://app-dev-001:443/en-US/account/login?return_to=%2Fen-US%2F&lt;/A&gt;&lt;BR /&gt;
4)&lt;A href="https://app-dev-001:443/en-US/account/login"&gt;https://app-dev-001:443/en-US/account/login&lt;/A&gt;   (This is POST request)&lt;BR /&gt;
5)&lt;A href="https://app-dev-001:443/en-US/app/launcher/"&gt;https://app-dev-001:443/en-US/app/launcher/&lt;/A&gt;&lt;BR /&gt;
6)&lt;A href="https://app-dev-001:443/en-US/app/launcher/home"&gt;https://app-dev-001:443/en-US/app/launcher/home&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Can you please provide any pointers/links about the "4)" request call  : &lt;A href="https://app-dev-001:443/en-US/account/login"&gt;https://app-dev-001:443/en-US/account/login&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 14:32:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238731#M6678</guid>
      <dc:creator>amoldesai</dc:creator>
      <dc:date>2016-05-05T14:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to run a brute force attack test on application username and password?</title>
      <link>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238732#M6679</link>
      <description>&lt;P&gt;Here is the http traffic flow :&lt;/P&gt;

&lt;P&gt;1)&lt;A href="https://app-dev-001:443/"&gt;https://app-dev-001:443/&lt;/A&gt;&lt;BR /&gt;
2)&lt;A href="https://app-dev-001:443/en-US/"&gt;https://app-dev-001:443/en-US/&lt;/A&gt;&lt;BR /&gt;
3)&lt;A href="https://app-dev-001:443/en-US/account/login?return_to=%2Fen-US%2F"&gt;https://app-dev-001:443/en-US/account/login?return_to=%2Fen-US%2F&lt;/A&gt;&lt;BR /&gt;
4)&lt;A href="https://app-dev-001:443/en-US/account/login"&gt;https://app-dev-001:443/en-US/account/login&lt;/A&gt;   (This is POST request)&lt;BR /&gt;
5)&lt;A href="https://app-dev-001:443/en-US/app/launcher/"&gt;https://app-dev-001:443/en-US/app/launcher/&lt;/A&gt;&lt;BR /&gt;
6)&lt;A href="https://app-dev-001:443/en-US/app/launcher/home"&gt;https://app-dev-001:443/en-US/app/launcher/home&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Can you please provide any pointers/links about the "4)" request call  : &lt;A href="https://app-dev-001:443/en-US/account/login"&gt;https://app-dev-001:443/en-US/account/login&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2016 14:32:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238732#M6679</guid>
      <dc:creator>amoldesai</dc:creator>
      <dc:date>2016-05-05T14:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to run a brute force attack test on application username and password?</title>
      <link>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238733#M6680</link>
      <description>&lt;P&gt;I believe the username and password arguments to the POST call have to be submitted in a form.&lt;/P&gt;

&lt;P&gt;We're beyond the scope of the Splunk forums now.  Perhaps THC has a forum that can be helpful on this topic.&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2016 12:22:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-to-run-a-brute-force-attack-test-on-application-username-and/m-p/238733#M6680</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2016-05-06T12:22:45Z</dc:date>
    </item>
  </channel>
</rss>

