Looking for logging into the Browser Prompt Attack site and are not getting the correct working link for it? In such a case, you can use the links given here by searching your desired login page in the search box. If the page is present on our website then you will get all the links related to the Browser Prompt Attack site. After that you can login as usual with your login credentials.
https://perishablepress.com/brute-force-login-drip-attack/
https://stackoverflow.com/questions/9859627/how-to-prevent-browser-to-invoke-basic-auth-popup-and-handle-401-error-using-jqu
https://www.owasp.org/index.php/Blocking_Brute_Force_Attacks
https://kc.mcafee.com/corporate/index?page=content&id=KB73774&actp=LIST&locale=en_US&viewlocale=en_US
https://labs.mwrinfosecurity.com/blog/pth-attacks-against-ntlm-authenticated-web-applications/
https://www.peteresnyder.com/static/papers/The_Effect_of_Repeated_Login_Prompts_on_Phishing_Susceptibility.pdf
https://github.com/liberapay/liberapay.com/issues/504
https://it.slashdot.org/story/16/01/17/1936211/lastpass-vulnerable-to-extremely-simple-phishing-attack
https://support.portswigger.net/customer/portal/articles/1964020-using-burp-to-brute-force-a-login-page
https://thehackernews.com/2019/02/advance-phishing-login-page.html
https://motherboard.vice.com/en_us/article/yp3dvx/lastpass-phishing-attack-lets-hackers-get-all-your-passwords
https://attack.mitre.org/techniques/T1081/
https://www.usenix.org/conference/laser2016/program/presentation/snyder