Bypassing Rate Limit Protection¶
- Ip Rotator - If developer implemented rate limit in such a way that the application blocks the ip address of attacker after few requests, then you may try using IP Rotator to change your IP in each requests.
- Add the following headers in the request:
Instead of 127.0.0.1, try using 127.0.0.2, 127.0.0.3,...
X-Originating-IP: 127.0.0.1 X-Forwarded-For: 127.0.0.1 X-Remote-IP: 127.0.0.1 X-Remote-Addr: 127.0.0.1 X-Client-IP: 127.0.0.1 X-Host: 127.0.0.1 X-Forwared-Host: 127.0.0.1 X-Forwarded-For: 127.0.0.1
Even you can try using double X-Forwared-For header: - Try changing user-agent, cookies.
- Append null bytes (%00, %0d%0a, %0d, %0a, %09, %0C, %20) to the original endpoint (Ex:
POST /forgot-password%20 HTTP/1.1
). Also try adding the bytes after the value of parameter (likeemail=tuhin@gmail.com%20
) - Race condition. Read this as a reference.
- Add any random parameter in the request.
- Change the request body (Form to JSON, XML or vice-versa).
- Change request methods (POST to PUT or GET).
- If developer implemented captcha based protection then try Captcha Bypass Techniques.
- Gmail + and . trick.
- Change api version (Ex: api/v2/1729/confirm-email to api/v1/1729/confirm-email).