322
◾
Ethical Hacking and Penetration Testing Guide
Step 5
—Once we have everything set up, we will click on “Intruder” at the top and click on
“Start Attack,” and it will try the wordlist against our target.
On the 15th request, we see a difference between the content length and the status, which
probably means that we can correctly guess our password. Please note that the success rate of this
attack solely depends upon the quality of your wordlist.
Dostları ilə paylaş: