Rate Limit Bypass

If you are attacking the /api/v3/sign-up endpoint try to perform bruteforce to /Sing-up, /SignUp, /singup...

Also try appending to the original endpoint bytes like %00, %0d%0a, %0d, %0a, %09, %0C, %20

X-Originating-IP: 127.0.0.1X-Forwarded-For: 127.0.0.1X-Remote-IP: 127.0.0.1X-Remote-Addr: 127.0.0.1X-Client-IP: 127.0.0.1X-Host: 127.0.0.1X-Forwared-Host: 127.0.0.1​​#or use double X-Forwared-For headerX-Forwarded-For:X-Forwarded-For: 127.0.0.1

If they are limiting to 10 tries per IP, every 10 tries change the IP inside the header.

Try changing the user-agent, the cookies... anything that could be able to identify you.

最后更新于

这有帮助吗?