A bugbounty threads about OTP related hunting

1/n

Test these whenever you encounter with OTP related functionalities like email or phone confirmation, password reset, login with OTPs etc.

#bugbounty #bugbountytips #bugbountytip #hacking #cybersecurity #infosec #bughunting
2/n

1. Bruteforce OTP (tool : Burp intruder)

2. Developers implement additional parameters to protect their application from bruteforce attack. eg. LoginAttempt=3 or wrong_attempt_left=1, modify or remove these parameters
3/n

3. There is a huge possibility that you may get banned during brute forcing OTP. You can bypass that by taking some steps like: - Change *User-Agent* header - Change IP via VPN or IP rotator

4. You can add custom headers to bypass the bruteforcing restrictions :
X-Originating-IP: 127.0.0.1 X-Forwarded-For: 127.0.0.1 X-Remote-IP: 127.0.0.1 X-Remote-Addr: 127.0.0.1 X-Client-IP: 127.0.0.1
X-Host: 127.0.0.1
X-Forwared-Host: 127.0.0.1 True-Client-IP: 127.0.0.1
X-Real-IP: 127.0.0.1

Note: you can use paraminer to find accepting headers
5/n

5. No restriction on OTP regeneration [Rate Limit bugs]
- DOS on victim's phone
- Money waste for company
- This also leads to infinitely refresh OTP until our desired OTP
6/n

6. Victim account locking Bruteforcing can be used to lockout user access to her account for specific time duration eg. 8hrs.

7. Check if OTP expires Login —> Logout —> Login (with previous OTP)

8. Password link does not expire after usage
7/n

9. Use same OTP to login from different browsers

10. Use same OTP to login same account from different computer as well as Mobile

11. OTP can be used from other action Let's say Login & Passwd Change action have 2FA implemented, you can reuse login OTP at passwd change.
8/n

12. OTP in response

13. Password reset token in response
- Click Forgot Password
- Insert existing username or email address
- Set interception proxy and catch request to this endtpoint
- Proceed the request and check that password-reset link returned in response json body

- Go to the URL and set password for any account
14. Play with other parameters Add, remove, duplicate other parameters going along with OTP, doing such you can bypass OTP check on the server side, and with that you can send wrong OTP to get access to victim account.
10/n

15. Response manipulation Sometimes developers relies on response other than OTP to validate user. Save the response after entering correct OTP & use that response to replace the wrong attempt response.
For eg. Is_OTP_Correct:False —> is_OTP_Correct:True
Thanks for reading hope you liked it.

Retweet this to let others know...

Credits ~ @0xKaran

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Lohitaksh Nandan

Lohitaksh Nandan Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @NandanLohitaksh

Apr 28
The Linux Privilege Escalation Cheatsheet... :)

Credits ~ @g0tmi1k

👇🏻🧵

#cybersecurity #infosec #linux #hacking #redteam
Operating System
What's the distribution type? What version?

cat /etc/issue
cat /etc/*-release
cat /etc/lsb-release

What's the kernel version? Is it 64-bit?

cat /proc/version
uname -a
uname -mrs
rpm -q kernel
dmesg | grep Linux
ls /boot | grep vmlinuz-
What can be learnt from the environmental variables?

cat /etc/profile
cat /etc/bashrc
cat ~/.bash_profile
cat ~/.bashrc
cat ~/.bash_logout
env
set

Is there a printer?

lpstat -a
Read 21 tweets
Apr 27
FREE LABS TO TEST YOUR PENTEST/CTF SKILLS :-)

Retweet this to let others know :)

#cybersecurity #infosec #pentesting
Academy Hackaflag BR - hackaflag.com.br
Attack-Defense - attackdefense.com
Alert to win - alf.nu/alert1
CTF Komodo Security - ctf.komodosec.com
CMD Challenge - cmdchallenge.com
Explotation Education - exploit.education
Google CTF - lnkd.in/e46drbz8
HackTheBox - hackthebox.com
Hackthis - hackthis.co.uk
Hacksplaining - lnkd.in/eAB5CSTA
Hacker101 - ctf.hacker101.com
Hacker Security - lnkd.in/ex7R-C-e
Hacking-Lab - hacking-lab.com
Read 7 tweets
Apr 23
Recon Tools for Web Application Pentesting... :)

Credits ~ Khalid Maina

A Thread 🧵↓

#cybersecurity #pentesting #bugbounty
Proxy

- burpsuite
- zap proxy

Subdomain

- subfinder
- assetfinder
- amass
- sublist3r
- dig
- chaos (chaos.projectdiscovery.io)

Webspidering

- gospider
- gau
- linkfinder
- waybackurls
- hakrawler
- paramspider

Directory/fuzzing

- ffuf
- wfuzz
- gobuster
- dirbuster
Fingerprinting

- wappalyzer
- builtwith
- netcraft
- whatweb
- wafw0f

Vulnerability

- nuclei
- wpscan
- nikto

Email

- mxtoolbox
- emkei
- anonymailer
- thunderbird

Exploit

- searchsploit
- exploitdb

Sensitive data

- trufflehog
- gitsecrets
Read 5 tweets
Mar 7
Websites/Platforms 🌐 to learn to hack 🕵️

⚗️Cybersecurity training platform

→ Hackthebox
→ Hacxpert
→ Tryhackme
→ Pentester Lab
→ Vulnhub
→ Cybrary
→ CybersecLabs
→ Root Me
→ OverTheWire
→ Vulnmachines
→ RangeForce
→ certifiedsecure
→ EchoCTF
→ Try2Hack

thread
🌐Web Exploitation
→ Hackxpert
→ Portswigger Web Security Academy
→ Bug Bounty Hunter
→ Pentester Lab
application.security
→ OWASP Juice Shop
→ OWASP WebGoat
→ bWAPP
→ OWASP Broken Web Application
🏁CTF Based Learning
→ CTFTime
→ PicoCTF
→ 247CTF
→ Hackthissite
→ WeChall
→ W3challs
→ Hacker101
→ IO wargame
Read 8 tweets
Mar 7
7 Hacking Books you must read...

🧵

#cybersecurity #hacking
1/

1. Web Application Hackers Handbook

amazon.in/Web-Applicatio…
2/

2. Real-World Bug Hunting

amazon.in/Real-World-Bug…
Read 8 tweets
Mar 7
Roadmap for learning Android Development by @championswimmer

Thread Summary 🧵👇
1. Expectations from an Android Developer
i. Android Engineer: Knows basics of programming, can work in android team.
ii. Senior Android Engineer: Knows UI-based development, can be responsible for a small app.
iii. Android Lead: Design + Architecture of complex apps.
2. OOPs Concepts
i. Interfaces, Abstract Classes
ii. Collection Framework - ArrayList, HashMap, Iterator
iii. Visibility (public/private/package) and Inheritance
iv. Exceptions, try-catch syntax
Read 17 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(