Welcome back, hacker novitiates! While tools like Burp Suite have dominated web hacking for years, today I’d like to show you how to conduct a password attack using Caido. Caido brings a fresh approach to web application penetration testing with its clean interface, powerful features, and developer-friendly design (an introduction to this tool can be […]
The post Web App Hacking: Online Password Cracking with Caido first appeared on Hackers Arise.
Welcome back, hacker novitiates!
While tools like Burp Suite have dominated web hacking for years, today I’d like to show you how to conduct a password attack using Caido. Caido brings a fresh approach to web application penetration testing with its clean interface, powerful features, and developer-friendly design (an introduction to this tool can be found here).
Please note that password attacks will not work against all web forms. In many cases, the application will lock you out after a certain number of failed attempts. This type of attack also relies heavily on having a strong password list. Nevertheless, every web application hacker should be familiar with how to perform such an attack.
Step #1: Fire up Kali and Caido
First, we need to enable the proxy in the browser and start intercepting requests. After that, it’s good practice to add our target to the scope to avoid capturing unrelated traffic.

Step #2: Intercept the Login Request
Before submitting the login credentials, make sure that the Caido proxy intercept is enabled (the Forwarding button will change to Queuing) and that the proxy settings are correctly configured in your browser. Once you send the request, the proxy will capture it, as shown in the screenshot below.

Step #3: Send the Request to Caido Automate
You can send requests from other interfaces to the Automate interface simply by right-clicking on a request row in the traffic table or within a request pane.

Step #4: Set the Payloads
Before diving into payload types, it’s crucial to understand the four attack strategies that Caido offers. These strategies determine how your payloads are applied to the marked positions in your requests.
1. Sequential (Sniper)
This will replace markers one at a time. If you have multiple markers, only one will be replaced for any given request.
Use Cases:
- Testing individual parameters for vulnerabilities
- Focused brute-force attacks on single fields
- Systematic testing of each input field independently
2. All (Battering Ram)
This will replace all the markers with the same value.
Use Cases:
- Testing scenarios where the same value should be applied to multiple fields
- SQL injection testing across multiple parameters simultaneously
- Testing for consistent input validation across fields
3. Parallel (Pitchfork)
This will replace all the markers with different values from the different payloads. This requires payloads that each have the same number of elements.
Use Cases:
- Credential brute-forcing with paired username/password lists
- Testing related parameters that should work together
- A/B testing scenarios with corresponding values
4. Matrix (Cluster Bomb)
This will replace all the markers with all the combinations of payloads. Payloads can have different number of elements, but beware that this can create a large number of requests.
Use Cases:
- Comprehensive brute-force attacks
- Testing all possible parameter combinations
- Discovery of unexpected parameter interactions
In this example, I’ll be using a Sequential attack scenario.
Next, to use a wordlist of payload values, select the request element you want to replace by clicking, dragging, and holding over it, then click the + Add Placeholder button.

Once a placeholder has been marked, you will see options in the Payload tab. From the Type drop-down menu, you can choose:
- Hosted File: Presents a Selected file drop-down menu, allowing you to choose a wordlist you have uploaded to your Caido instance.
- Simple List: Provides an input field where you can manually enter a wordlist, with one payload per line. You can also load a wordlist file directly by clicking the Load from file… button.

By clicking on the Settings tab of an Automate session, you can control the request rate using the Delay (ms) between requests and # of workers input fields.

Once you’ve made your selection, click the Run button to launch the Automate session. A new tab will open containing a traffic table of the payload requests. To view the results of the session, simply click on this paired tab.

As a result, we have unrestricted access to automation capabilities, unlike the rate-limited Intruder feature in Burp Suite.
Summary
The key to successful web form testing lies in understanding the application’s behavior, systematically testing all input vectors, and carefully analyzing responses to identify vulnerabilities. Caido’s powerful features support this methodology while offering a more streamlined and enjoyable testing experience compared to traditional tools.
If you’re serious about becoming a web application hacker, consider exploring our Web App Hacking course. And if you’ve already mastered the basics and proven your skills, check out Advanced Web App Hacking—it’s designed to take your expertise to the next level.
The post Web App Hacking: Online Password Cracking with Caido first appeared on Hackers Arise.
Source: HackersArise
Source Link: https://hackers-arise.com/web-app-hacking-online-password-cracking-with-caido/