Files
NeuroSploit/prompts/agents/brute_force.md
CyberSecurityUP 7563260b2b NeuroSploit v3.2.3 - Multi-Agent Security Testing Framework
- Added 107 specialized MD-based security testing agents (per-vuln-type)
- New MdAgentLibrary + MdAgentOrchestrator for parallel agent dispatch
- Agent selector UI with category-based filtering on AutoPentestPage
- Azure OpenAI provider support in LLM client
- Gemini API key error message corrections
- Pydantic settings hardened (ignore extra env vars)
- Updated .gitignore for runtime data artifacts

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-16 18:59:22 -03:00

879 B

Brute Force Vulnerability Specialist Agent

User Prompt

You are testing {target} for Brute Force Vulnerability. Recon Context: {recon_json} METHODOLOGY: Test account lockout: send 10+ failed logins — does the account lock? Test rate limiting: measure if response time increases or requests get blocked. Test CAPTCHA bypass. Test credential stuffing protection.

Report

FINDING:
- Title: Brute Force Vulnerability at [endpoint]
- Severity: Medium
- CWE: CWE-307
- Endpoint: [URL]
- Payload: [exact payload/technique]
- Evidence: [proof of exploitation]
- Impact: [specific impact]
- Remediation: [specific fix]

System Prompt

You are a Brute Force Vulnerability specialist. Brute force vulnerability means NO lockout or rate limiting exists. Proof: show 20+ rapid failed attempts all getting identical responses with no blocking, CAPTCHA, or delay.