Unveiling WebCrack: Automated Bulk Weak‑Password and Universal‑Password Cracking for Web Backends

When security testers need to scan thousands of web back‑ends for weak or universal passwords, WebCrack provides a fast, generic solution that automatically identifies login parameters, evaluates login success, applies dynamic dictionaries, rechecks results, and supports custom rules for a wide range of CMS platforms.

MaGe Linux Operations
MaGe Linux Operations
MaGe Linux Operations
Unveiling WebCrack: Automated Bulk Weak‑Password and Universal‑Password Cracking for Web Backends

Tool Overview

WebCrack is a bulk web‑backend weak‑password and universal‑password cracking tool that supports popular CMS such as Discuz, DedeCMS, phpMyAdmin and also works on many custom sites.

Implementation Idea

The workflow mimics manual Burp Suite Intruder testing: capture a request, mark the parameters to brute‑force, send payloads, and compare responses.

Parameter Identification

WebCrack uses the web_pwd_common_crack approach to locate username and password fields by searching for keywords like user , pass , and their pinyin variations (e.g., yonghu , mima ).

Login Success Determination

Two guaranteed‑wrong passwords are sent first; if the response lengths differ, the target is considered non‑deterministic and the scan stops. If the lengths are identical, the length is recorded as a baseline. Subsequent responses are compared to this baseline, while also checking for the presence of login‑page keywords after redirection.

Direct page‑equality checks are avoided because many CMS display a failure dialog without changing the URL.

Recheck Phase

After a potential credential is found, WebCrack resends the request and compares the new error length; a mismatch confirms a correct password. This step reduces false positives caused by WAF‑induced response changes.

Dynamic Dictionary

If the target lacks a domain name, the tool generates a list such as test.webcrack.com, webcrack.com, webcrack, etc., which can be customized with suffixes.

Universal Password Detection

Common universal‑password payloads (e.g., admin' or '1'='1) are tried; detections that trigger WAF blocks are filtered using a blacklist.

Custom Rules

Users can define CMS‑specific rules in a cms.json file, specifying keywords, captcha presence, success/failure flags, and notes. This allows fine‑tuning for obscure or heavily protected sites.

Captcha Handling

Captcha recognition is omitted because it is unreliable and slows scanning; the tool simply aborts when a captcha is detected.

Testing Results

Compared with web_pwd_common_crack, WebCrack discovered 19 vulnerable sites (16 true positives) versus 11 (7 true positives) for the reference tool, including additional universal‑password and dynamic‑dictionary findings.

Conclusion

WebCrack addresses the diversity of web‑backend login mechanisms, handling redirects, error‑length variations, and WAF interference, while offering extensibility through custom rule files.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

Backend Securityautomated crackingCMS Enumerationweak password detectionWebCrack
MaGe Linux Operations
Written by

MaGe Linux Operations

Founded in 2009, MaGe Education is a top Chinese high‑end IT training brand. Its graduates earn 12K+ RMB salaries, and the school has trained tens of thousands of students. It offers high‑pay courses in Linux cloud operations, Python full‑stack, automation, data analysis, AI, and Go high‑concurrency architecture. Thanks to quality courses and a solid reputation, it has talent partnerships with numerous internet firms.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.