- Dapatkan link
- X
- Aplikasi Lainnya
let’s see if i can able to perform Open Redirection
Steps:
Go to https://web.target.com & login.
2. Now go to profile and add whats-app number.submit victim number/test number.
3. Intercept that request in Burp Suite and send it to repeater.
4. Now i change the “domain”: in request to “domain”:”https://bing.com" the request & response look like:
check both request and response
5. Now the victim receives a message from Target.com official whats-app account. victim click on link and redirected to attackers domain.
But that’s a low severity issue and doesn’t seem a security concern. So i just did one thing and try to leverage it to some serious vulnerability.
6. After verification of Whats app number i requested for password reset token. And captured that request in burpsuite.
7. Changed the “domain” to Ngrok URL and got message with reset link.
8. same time got a request in Ngrok dashboard, which carry password reset token.
9. I used that token to reset password of victim account.
Impact: This vulnerability can leads to account takeover.
The company fixed the vulnerability and rewarded meπ²π²π².
Twitter: https://twitter.com/Mah3Sec_
- Dapatkan link
- X
- Aplikasi Lainnya

Komentar
Posting Komentar