Last updated
Last updated
With some fuzzing we can figure out that the search is using LDAP. The forgot password message reveals that the password is in the 'description' field. This allows us to char-by-char brute the password: administrator)(description=*
Will return a result if the password matches this pattern
The pw is: very_secure_hacktivity_pass