Member-only story
$200 Easy Bounty: Improper Rate Limiting Exploit
Rate Limiting gives you Easy Bounty
Hi geeks, it4chis3c (Twitter) came-up with the write-up on Improper Rate Limiting Vulnerability found on one of the target’s internal login page.

During my OSINT reconnaissance on *.target.com
, I discovered an IP (198.x.x.x
) hosting the target Login Page. Interestingly, the SSL certificate belonged to xy.target.com
, indicating a possible misconfiguration.
Discovery & Exploitation
I decided to test the authentication page (https://198.x.x.x/target-protect/login.esp
) for improper rate limiting using various brute-force techniques. After multiple tests, I found that the implementation of rate limiting was weak, allowing an attacker to brute-force login credentials effectively.
Steps to Reproduce:
- Navigate to the authentication page:
https://198.x.x.x/target-protect/login.esp

2. Intercept the login request using Burp Suite & send it to Intruder.