Guessable credentials found

OWASP 2013-A2 OWASP 2017-A2 OWASP 2021-A7 OWASP PC-C8 CAPEC-560 CWE-287 WASC-18 WSTG-ATHN-02

The guessable credentials can find in most of the application. It may add for the testing purpose or an initial setup and later forget about it and added to the production server. Usage of common usernames and password leads to a successful brute-force attack. The most common used username and password combos gave below.

  • admin: admin
  • admin: password
  • admin: 12345
  • Administrator: password

Even if it have brute-force prevention mechanism, most of the attackers first check manually with above credentials or use the framework default username and password.


Chances of a high success rate in the brute-force attack

Mitigation / Precaution

Beagle recommends the following fixes:-

  • Implement a strong password policy consisting of a combination of alphanumeric characters and a minimum length of 8 characters.
  • Use an anti-brute-force mechanism like captcha.

Latest Articles