How I bypassed an IP block… without changing my IP?
1 min read
Summary
The writer details their experience navigating a Portswigger cyber security lab which boasted heightened protections to block brute-force attacks by monitoring IP activity, making it so after a few unsuccessful login attempts you would be locked out - but the writer knew there was a flaw in the system and knew how to exploit it without ever changing their IP.
The goal of the lab was simple, to show how the writer was able to penetrate the system and expose the flaws in the security.
The article explains the writers thought process and workflow and how they were able to anticipate and penetrate the security protections, which sets them apart from the average hacker.
The article aims to teach the reader how to think logically and critically and provide a workflow for thinking about these kinds of problems so the reader can apply it to other situations.