mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2025-12-12 15:49:38 -08:00
Markdown Fix Lint
This commit is contained in:
@@ -30,6 +30,7 @@ Countermeasures like rate limiting, account lockout policies, CAPTCHA, and stron
|
||||
### Burp Suite Intruder
|
||||
|
||||
* **Sniper attack**: target a single position (one variable) while cycling through one payload set.
|
||||
|
||||
```ps1
|
||||
|
||||
Username: password
|
||||
@@ -99,9 +100,9 @@ JA3 is a method for fingerprinting TLS clients (and JA3S for TLS servers) by has
|
||||
|
||||
**Countermeasures:**
|
||||
|
||||
- Use browser-driven automation (Puppeteer / Playwright)
|
||||
- Spoof TLS handshakes with [lwthiker/curl-impersonate](https://github.com/lwthiker/curl-impersonate)
|
||||
- JA3 randomization plugins for browsers/libraries
|
||||
* Use browser-driven automation (Puppeteer / Playwright)
|
||||
* Spoof TLS handshakes with [lwthiker/curl-impersonate](https://github.com/lwthiker/curl-impersonate)
|
||||
* JA3 randomization plugins for browsers/libraries
|
||||
|
||||
### Network IPv4
|
||||
|
||||
@@ -137,7 +138,6 @@ proxychains ffuf -w wordlist.txt -u https://target.tld/FUZZ
|
||||
|
||||
Many cloud providers, such as Vultr, offer /64 IPv6 ranges, which provide a vast number of addresses (18 446 744 073 709 551 616). This allows for extensive IP rotation during brute-force attacks.
|
||||
|
||||
|
||||
## References
|
||||
|
||||
* [Bruteforcing the phone number of any Google user - brutecat - June 9, 2025](https://brutecat.com/articles/leaking-google-phones)
|
||||
|
||||
Reference in New Issue
Block a user