Summary

  • The writer details their experience navigating a Portswigger cyber security lab which boasted heightened protections to block brute-force attacks by monitoring IP activity, making it so after a few unsuccessful login attempts you would be locked out - but the writer knew there was a flaw in the system and knew how to exploit it without ever changing their IP.
  • The goal of the lab was simple, to show how the writer was able to penetrate the system and expose the flaws in the security.
  • The article explains the writers thought process and workflow and how they were able to anticipate and penetrate the security protections, which sets them apart from the average hacker.
  • The article aims to teach the reader how to think logically and critically and provide a workflow for thinking about these kinds of problems so the reader can apply it to other situations.

By phoenixcatalan

Original Article