
Vulnerability
The guessable credentials can find in most of the application. It may add for the testing purpose or an initial setup and later forget about it and added to the production server. Usage of common usernames and password leads to a successful brute-force attack. The most common used username and password combos gave below.
- admin: admin
- admin: password
- admin: 12345
- Administrator: password
Even if it have brute-force prevention mechanism, most of the attackers first check manually with above credentials or use the framework default username and password.
Impact
Chances of a high success rate in the brute-force attack
Mitigation / Precaution
Beagle recommends the following fixes:-
- Implement a strong password policy consisting of a combination of alphanumeric characters and a minimum length of 8 characters.
- Use an anti-brute-force mechanism like captcha.
Summarize:
Experience the Beagle Security platform
Unlock one full penetration test and all Advanced plan features free for 14 days





