Guessable credentials found

By
Febna V M
Published on
24 Jun 2018
Vulnerability

The guessable credentials can find in most of the application. It may add for the testing purpose or an initial setup and later forget about it and added to the production server. Usage of common usernames and password leads to a successful brute-force attack. The most common used username and password combos gave below.

  • admin: admin
  • admin: password
  • admin: 12345
  • Administrator: password

Even if it have brute-force prevention mechanism, most of the attackers first check manually with above credentials or use the framework default username and password.

Impact

Chances of a high success rate in the brute-force attack

Mitigation / Precaution

Beagle recommends the following fixes:-

  • Implement a strong password policy consisting of a combination of alphanumeric characters and a minimum length of 8 characters.
  • Use an anti-brute-force mechanism like captcha.
Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Febna V M
Febna V M
Cyber Security Engineer
Experience the Beagle Security platform
Unlock one full penetration test and all Advanced plan features free for 10 days
Find surface-level website security issues in under a minute
Free website security assessment
Experience the power of automated penetration testing & contextual reporting.