Rate Limit Circumvention Challenge
See original GitHub issueAdding https://www.npmjs.com/package/ratelimiter to some route (e.g. login or change-password) would make an additional challenge possible where the rate limit needs to be circumvented somehow.
For this to work, ratelimiter
needs to be misconfigured or maybe an older version with known weaknesses can be used. Needs to be analyzed.
- Alternative 1: Write an own (broken) rate limiting feature.
- Alternative 2: Typosquat
ratelimiter
and make it broken. (Risky because it might be kicked off npmjs.org at some point?)
Issue Analytics
- State:
- Created 6 years ago
- Comments:5 (4 by maintainers)
Top Results From Across the Web
Bypassing rate limit abusing misconfiguration rules | by Daniel V
A rate limiting algorithm is used to check if the user session (or IP-address) has to be limited based on the information in...
Read more >Rate Limiting: Protect against brute force assaults, API abuse ...
Rate Limiting : Protect against brute force assaults, API abuse and Layer 7 DDoS attacks · Key moments. View all · Key moments...
Read more >Bypassing IP Based Rate-Limit - Yusuf Atalay - Medium
Hello everyone, in this post I will briefly explain how to bypass this type of rate-limiting. Lets explain what this protection system is....
Read more >An alternative approach to rate limiting - Figma
Finding a way to satisfy the last two requirements — accurately controlling web traffic and minimizing memory usage — was more of a...
Read more >Rate limiting best practices - WAF - Cloudflare Docs
Rule #1 allows up to four requests per minute, after which a Managed Challenge is triggered. This configuration allows legitimate customers a ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
I have some nice idea to implement this challenge. Like:-
1.Rate limit Bypass on BruteForce of Forgot Password Secret Token 2.Login Form Bruteforcing
Broken feature will be Implementation of rate limiting on the basis of Originating IP. which then can be bypassed by Spoofing X-Forwarded-For: IP Header.
Will look into ratelimiter and will look into any cool way of misconfiguring it.
This thread has been automatically locked because it has not had recent activity after it was closed. 🔒 Please open a new issue for regressions or related bugs.