authentication bypass checklist !!

https://medium.com/@reachaxis/how-i-took-over-100-000-user-account-without-knowing-their-password-part-one-7d965ae9e47aarrow-up-right ---> https://hackerone.com/reports/1709881arrow-up-right

1> make two accounts , compare both !! --> https://hackerone.com/reports/1709881arrow-up-right

2>Username enumeration via different responses

1> bruteforce username with a nice username worldlist and keep password as normal 123

then see for abnormal changes in length (it might be like incorrect password , that means we got

the username ,

2> put username we got as a different response and then put password on selected and start

bruteforcing the password field , boom , we might get different response here (302) and good

to go !!

3> 2FA simple bypass

two accounts

1> wiener:peter-->attackercreds

Victim's credentials carlos:montoya

2> just go through the requests of attacker and try to see the url for 2fa login , next time

i login with the victims account i will drop that url and than gain acess !!

4> again make two accounts

go to forgot password reset password (capture the reset pass req ) and try to replace victims

name for reset !!

5> when enumerating for different response from intruder , try to use grep match , or simple find it

and for password 302 is enough !

6> bypass the rate limit using the time line method ((using X-Forwarded-For ))

7> https://hackerone.com/reports/3329361arrow-up-right , login anf bypass 2fa , 1> click on the send code and then keep turn on the intercept and forward to the intruder (dont tun off the intercept or dont forward anything ) , just starting the intruder attack on otp from xxx100 to xxxx200 so i will put the otp such range such that my true otp is between and near !! --> vedio poc also present there !!

8> edit response and change the status to 200 and message as sucess and sucess true

9> changing post bosy params to victims email acc !! and value:false to value:true

10>use user/12345 on login fourms !! at file manager systems or anything -->https://hackerone.com/reports/1747146arrow-up-right ,

11>

Last updated

Was this helpful?