Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/qeeqbox/credential-stuffing

A threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks
https://github.com/qeeqbox/credential-stuffing

credentials example infosecsimplified metadta qeeqbox stuffing visualization vulnerability

Last synced: 2 days ago
JSON representation

A threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks

Awesome Lists containing this project

README

        

A threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks.

## Example #1
1. Threat actor has a stolen username and password pair for a vulnerable
2. Threat actor uses the same pair for other websites

## Impact
Vary

## Risk
- Gain unauthorized access

## Redemption
- Increase the password length
- Increase password complexity
- Limit login attempts
- Implement captcha
- Multi-factor authentication

## ID
8456e95b-dae6-44ff-bb2b-75a37e16c0c7

## References
- [wiki](https://en.wikipedia.org/wiki/brute-force_attack/)