WebGoat (A3) Sensitive Data Exposure - Insecure Login

It is too simple to write, but because of obsessive-compulsive disorder, I will write a topic. . .

This lesson just wants to vividly illustrate that an attacker can monitor network traffic, so encryption is very important for transmitting sensitive information. . There is no specific content, so the mind map is also omitted.

page 2

Question guide, click Log in, use the packet capture tool to capture the packet, you can get the user name and password of a user, fill in the corresponding input box in the figure below, and submit.

The burpsuite I used to capture packets, you can see the following messages in the proxy module, the username is CaptainJack, and the password is BlackPearl

You can also use the developer tools of the browser directly, for example, the picture below is chrome

It's over~ Alas. . .

Guess you like

Origin blog.csdn.net/elephantxiang/article/details/114649942