Search K
Appearance
Appearance
Other ways to support HackTricks:
The email of an account should be attempted to be changed, and the confirmation process must be examined. If found to be weak, the email should be changed to that of the intended victim and then confirmed.
victim@gmail.com
viฤtim@gmail.com
For further details, refer to the document on Unicode Normalization:
Should the target system allow the reset link to be reused, efforts should be made to find more reset links using tools such as gau
, wayback
, or scan.io
.
If the page contains CORS missconfigurations you might be able to steal sensitive information from the user to takeover his account or make him change auth information for the same purpose:
If the page is vulnerable to CSRF you might be able to make the user modify his password, email or authentication so you can then access it:
If you find a XSS in application you might be able to stal cookies, local storage, or info from the web page that could allow you takeover the account:
If you find a limited XSS or a subdomain take over, you could play with the cookies (fixating them for example) to try to compromise the victim account:
If the authentication response could be reduced to a simple boolean just try to change false to true and see if you get any access.
X-Forwarded-For
proxy header is altered to attacker.com
.attacker.com
.200 OK
.200 OK
.{"success":true}
or an empty object {}
.These manipulation techniques are effective in scenarios where JSON is utilized for data transmission and receipt.
From this report:
This also happened in this report.
Other ways to support HackTricks: