Introduction
Authentication enumeration is a fundamental aspect of security testing, concentrating specifically on the mechanisms that protect sensitive aspects of web applications; this process involves methodically inspecting various authentication components ranging from username validation to password policies and session management. Each of these elements is meticulously tested because they represent potential vulnerabilities that, if exploited, could lead to significant security breaches.
Objectives
By the end of this room, you will:
- Understand the significance of enumeration and how it sets the stage for effective brute-force attacks.
- Learn advanced enumeration methods, mainly focusing on extracting information from verbose error messages.
- Comprehend the relationship between enumeration and brute-force attacks in compromising authentication mechanisms.
- Gain practical experience using tools and techniques for both enumeration and brute-force attacks.
Pre-requisites
Before starting this room, you should have a basic understanding of the following concepts:
- Familiarity with HTTP and HTTPS, including request/response structures and common status codes.
- Experience using tools like Burp Suite.
- Basic proficiency in navigating and using the Linux command line.
Answer the questions below
Deploy the target VM attached to this task by pressing the green Start Machine button. After obtaining the machine’s generated IP address, you can either use the AttackBox or your own VM connected to TryHackMe’s VPN.
Add MACHINE_IP to your /etc/hosts file. For example:
MACHINE_IP enum.thm
After 3 minutes, visit http://enum.thm to access the machine. We recommend using the AttackBox for this room.
Task 2 Authentication Enumeration
Answer the questions below
What type of error messages can unintentionally provide attackers with confirmation of valid usernames?
Answer is Verbose Errors
Task 3 Enumerating Users via Verbose Errors
Understanding Verbose Errors
Verbose errors are like unintentional whispers of a system, revealing secrets meant to be kept hidden. These detailed error messages are invaluable during the debugging process, helping developers understand exactly what went wrong.
However, just like an overhead conversation might reveal too much, these verbose errors can unintentionally expose sensitive data to those who know how to listen.


What is the valid email address from the list?
Answer: [email protected]
Task 4 Exploiting Vulnerable Password Reset Logic
Question: What is the flag?
Answer: THM{50_pr3d1ct4BL333!!}
Task 5 Exploiting HTTP Basic Authentication
Question: What is the flag?
Answer: THM{b4$$1C_AuTTHHH}
Question: Try using Hydra instead of Burp to brute force the password.
Answer: No Answer
Task 6 OSINT
Question: Click me to proceed to the next task.
Answer: No answer needed
Task 7 Conclusion
Question: I can now attack authentication forms!
Answer: No Answer Needed
For any query contact us at [email protected]
Thank you for reading this post, don't forget to subscribe!


Leave feedback about this