Form-based authentication
In this section, we're going to learn how to brute force form-based authentication in web applications. We're going to start learning what form-based authentication is, and then we're going to modify one of our previous tools to enable this attack. Finally, we're going to test our script against the victim web application and fine tune it to improve the results.
Form-based authentication overview
Let's start with a quick overview of form-based authentication. Form-based authentication is the most common and widely used method of authentication in web applications.
This method is not standardized as the previous two methods we learned were, which means that the implementation of this method will vary. Basically, the web application will present a form that will prompt the user for the username and password. Then, that data will go to the server where it will be evaluated, and if the credentials are valid, it will provide a valid session cookie to the user, and it will...