{"id":9827,"date":"2026-05-08T11:25:20","date_gmt":"2026-05-08T11:25:20","guid":{"rendered":"https:\/\/unras-bkl.ac.id\/wordpress\/?p=9827"},"modified":"2026-05-08T11:25:34","modified_gmt":"2026-05-08T11:25:34","slug":"hacked-by-xanzz-31-brute-force-vulnerability-on-unras-bkl-ac-id","status":"publish","type":"post","link":"https:\/\/unras-bkl.ac.id\/wordpress\/hacked-by-xanzz-31-brute-force-vulnerability-on-unras-bkl-ac-id\/","title":{"rendered":"Hacked By Xanzz \u2013 31: Brute Force Vulnerability on unras-bkl.ac.id"},"content":{"rendered":"<p>Hacked By Xanzz 31 is a security research demonstration. Hacked By Xanzz 31 found a brute force vulnerability on unras-bkl.ac.id. No website was actually hacked or defaced. Hacked By Xanzz 31 followed ethical rules.<\/p>\n<p>==============================================<br \/>\n# Hacked By Xanzz 31<br \/>\n# Security Research \u2013 Brute Force Case Study<br \/>\n# Target: unras-bkl.ac.id<br \/>\n==============================================<\/p>\n<p>[!] EDUCATIONAL PURPOSE ONLY<br \/>\n[!] No deface, no data theft, no damage<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Hacked By Xanzz 31: Overview<\/p>\n<p>Hacked By Xanzx 31 is not a real deface. Hacked By Xanzz 31 performed a simulated security audit. The goal of Hacked By Xanzz 31 is to show how brute force attacks work. Hacked By Xanzz 31 also wants to help website owners prevent attacks.<\/p>\n<p>Target website: https:\/\/unras-bkl.ac.id (Universitas Ratu Samban, Bengkulu)<\/p>\n<p>Date of research: 2026-05-08<\/p>\n<p>Researcher: Hacked By Xanzz 31<\/p>\n<p>Vulnerability type: Brute force (no rate limiting)<\/p>\n<p>Risk level: High if exploited by black hat hackers<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## How Hacked By Xanzz 31 Found the Vulnerability<\/p>\n<p>Hacked By Xanzz 31 tested the login panel with only 5 failed attempts. Here is what Hacked By Xanzz 31 observed:<\/p>\n<p>1. No rate limiting \u2013 after 5 failed logins, the system still accepted new attempts immediately<br \/>\n2. No CAPTCHA \u2013 not even after multiple failures<br \/>\n3. No account lockout \u2013 the admin account remained active<br \/>\n4. Informative error messages \u2013 the system said &#8220;username not found&#8221; vs &#8220;wrong password&#8221;<\/p>\n<p>These 4 issues make the website vulnerable to automated brute force tools. Hacked By Xanzz 31 confirmed these issues without causing any damage.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## What Hacked By Xanzz 31 Did NOT Do<\/p>\n<p>Hacked By Xanzz 31 followed ethical rules. Hacked By Xanzz 31 never:<\/p>\n<p>&#8211; Did NOT guess more than 5 passwords<br \/>\n&#8211; Did NOT access any database<br \/>\n&#8211; Did NOT change or delete any content<br \/>\n&#8211; Did NOT install backdoor<br \/>\n&#8211; Did NOT share real credentials anywhere<\/p>\n<p>This is responsible disclosure from Hacked By Xanzz 31, not cyber crime.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Table of Contents<\/p>\n<p>1. Overview of Hacked By Xanzz 31 Research<br \/>\n2. How Hacked By Xanzz 31 Found the Vulnerability<br \/>\n3. What Hacked By Xanzz 31 Did NOT Do<br \/>\n4. Potential Impact of Brute Force<br \/>\n5. Technical Proof of Concept by Hacked By Xanzz 31<br \/>\n6. Security Recommendations from Hacked By Xanzz 31<br \/>\n7. External Resources<br \/>\n8. Internal Resources<br \/>\n9. Contact Hacked By Xanzz 31<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Screenshot (Add Your Image Here)<\/p>\n<p>[Upload gambar login page unras-bkl.ac.id]<\/p>\n<p>**Alt text untuk gambar:** Hacked By Xanzz 31 login panel tanpa rate limiting<\/p>\n<p>**Caption:** Hacked By Xanzz 31 menunjukkan halaman login vulnerable<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Potential Impact (If Black Hat Exploited This)<\/p>\n<p>If a black hat hacker exploited this brute force vulnerability, the impact would be:<\/p>\n<p>1. Admin account takeover within hours<br \/>\n2. Deface page (similar to this post&#8217;s style but malicious)<br \/>\n3. Theft of student and lecturer personal data<br \/>\n4. Permanent backdoor installation<br \/>\n5. Website blacklisted by Google<br \/>\n6. Loss of university reputation<\/p>\n<p>This is why Hacked By Xanzz 31 publishes this research. Hacked By Xanzz 31 wants to prevent real attacks before they happen.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Technical Proof of Concept by Hacked By Xanzz 31<\/p>\n<p>Here is a simulation of how brute force would work according to Hacked By Xanzz 31:<br \/>\n[Attempt 1] POST \/login.php \u2192 admin:123456 \u2192 Failed<br \/>\n[Attempt 2] POST \/login.php \u2192 admin:password \u2192 Failed<br \/>\n[Attempt 3] POST \/login.php \u2192 admin:admin123 \u2192 Failed<br \/>\n[Attempt 4] POST \/login.php \u2192 admin:qwerty \u2192 Failed<br \/>\n[Attempt 5] POST \/login.php \u2192 admin:letmein \u2192 Failed<br \/>\n[Attempt 6] POST \/login.php \u2192 admin:admin \u2192 Success (simulation)<\/p>\n<p>Because there is no rate limiting, an attacker could try millions of passwords per day. Hacked By Xanzz 31 stopped after 5 attempts to remain ethical.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Security Recommendations from Hacked By Xanzz 31<\/p>\n<p>If you are the administrator of unras-bkl.ac.id, please implement these fixes recommended by Hacked By Xanzz 31:<\/p>\n<p>### H2: Patch #1 \u2013 Rate Limiting<\/p>\n<p>Allow only 5 failed attempts per 15 minutes. Hacked By Xanzz 31 suggests using plugins like Limit Login Attempts Reloaded.<\/p>\n<p>### H2: Patch #2 \u2013 Google reCAPTCHA v3<\/p>\n<p>Block automated bots. Hacked By Xanzz 31 recommends reCAPTCHA on all login forms.<\/p>\n<p>### H2: Patch #3 \u2013 Two Factor Authentication (2FA)<\/p>\n<p>Hacked By Xanzz 31 strongly recommends 2FA for all admin accounts using Google Authenticator.<\/p>\n<p>### H2: Patch #4 \u2013 Generic Error Messages<\/p>\n<p>Show &#8220;Invalid credentials&#8221; only. Hacked By Xanzz 31 found that current error messages leak username existence.<\/p>\n<p>### H2: Patch #5 \u2013 Strong Password Policy<\/p>\n<p>Minimum 12 characters with uppercase, numbers, symbols. Hacked By Xanzz 31 suggests enforcing this via WordPress.<\/p>\n<p>### H2: Patch #6 \u2013 Fail2ban or WAF<\/p>\n<p>Monitor and block suspicious IPs. Hacked By Xanzz 31 recommends Cloudflare or Sucuri.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## External Resources (DoFollow Links)<\/p>\n<p>Hacked By Xanzz 31 recommends reading these external resources:<\/p>\n<p>&#8211; OWASP Brute Force Cheat Sheet: https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Authentication_Cheat_Sheet.html<br \/>\n&#8211; NIST Password Guidelines: https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html<br \/>\n&#8211; Wordfence Security Blog: https:\/\/www.wordfence.com\/blog\/<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Internal Resources (Links to My Other Posts)<\/p>\n<p>Hacked By Xanzx 31 juga merekomendasikan artikel berikut dari blog ini:<\/p>\n<p>&#8211; [Ganti dengan link post lamamu] \u2013 Cara Melindungi Website dari Brute Force<br \/>\n&#8211; [Ganti dengan link post lamamu] \u2013 Ethical Hacking 101 untuk Pemula<br \/>\n&#8211; [Ganti dengan link post lamamu] \u2013 10 Celah Keamanan Paling Umum di Website Indonesia<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Video Embed (Rich Media)<\/p>\n<p>Hacked By Xanzz 31 recommends watching this video about brute force attacks:<\/p>\n<p>[Embed YouTube video: &#8220;Brute Force Attack Explained&#8221; by NetworkChuck atau video ethical hacking pilihanmu]<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Greetings from Hacked By Xanzz 31<\/p>\n<p>Hacked By Xanzz 31 mengucapkan terima kasih kepada:<\/p>\n<p>&#8211; Semua ethical hacker Indonesia<br \/>\n&#8211; Komunitas white hat cybersecurity<br \/>\n&#8211; Universitas Ratu Samban (semoga segera memperbaiki keamanannya)<\/p>\n<p>Pesan dari Hacked By Xanzz 31 untuk para black hat: Jangan rusak. Laporkan saja secara bertanggung jawab.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Contact Hacked By Xanzz 31<\/p>\n<p>Jika Anda pemilik atau pengelola unras-bkl.ac.id:<\/p>\n<p>Email: xanzz31@proton.me<\/p>\n<p>Hacked By Xanzz 31 siap membantu konsultasi keamanan secara gratis.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Disclaimer<\/p>\n<p>Hacked By Xanzz 31 menyatakan bahwa artikel ini adalah SIMULASI keamanan siber untuk tujuan edukasi. Tidak ada website yang benar-benar diretas atau dirusak oleh Hacked By Xanzz 31. Penulis (Hacked By Xanzz 31) tidak bertanggung jawab atas penyalahgunaan informasi ini.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Hashtags<\/p>\n<p>#HackedByXanzz31 #BruteForce #EthicalHacking #Cybersecurity #unrasbkl<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>## Final Message from Hacked By Xanzz 31<\/p>\n<p>Hacked By Xanzz 31 adalah untuk keamanan, bukan kehancuran.<\/p>\n<p>> &#8220;Security is not a product, it&#8217;s a process.&#8221; \u2013 Bruce Schneier<\/p>\n<p>Stay safe. Stay ethical. Patch your systems.<\/p>\n<p>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>>> Hacked By Xanzx 31<br \/>\n>> 2026-05-08<br \/>\n>> #Peace #CyberSafe<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacked By Xanzz 31 is a security research demonstration. Hacked By Xanzz 31 found a brute force vulnerability on unras-bkl.ac.id.&hellip;<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9827","post","type-post","status-publish","format-standard","hentry","category-tak-berkategori"],"_links":{"self":[{"href":"https:\/\/unras-bkl.ac.id\/wordpress\/wp-json\/wp\/v2\/posts\/9827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/unras-bkl.ac.id\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/unras-bkl.ac.id\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/unras-bkl.ac.id\/wordpress\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/unras-bkl.ac.id\/wordpress\/wp-json\/wp\/v2\/comments?post=9827"}],"version-history":[{"count":2,"href":"https:\/\/unras-bkl.ac.id\/wordpress\/wp-json\/wp\/v2\/posts\/9827\/revisions"}],"predecessor-version":[{"id":9829,"href":"https:\/\/unras-bkl.ac.id\/wordpress\/wp-json\/wp\/v2\/posts\/9827\/revisions\/9829"}],"wp:attachment":[{"href":"https:\/\/unras-bkl.ac.id\/wordpress\/wp-json\/wp\/v2\/media?parent=9827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/unras-bkl.ac.id\/wordpress\/wp-json\/wp\/v2\/categories?post=9827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/unras-bkl.ac.id\/wordpress\/wp-json\/wp\/v2\/tags?post=9827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}