Snap Sec Profile picture
Mar 11 โ€ข 12 tweets โ€ข 3 min read
๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐Ÿฎ๐—™๐—”๐Ÿ“ฒ ๐—ถ๐—ป ๐— ๐—ผ๐—ฑ๐—ฒ๐—ฟ๐—ป ๐—ช๐—ฒ๐—ฏ ๐—”๐—ฝ๐—ฝ๐˜€

9 Different Techniques to Bypass 2FA in WebApps.

[A Thread ๐Ÿงต]

#bugbounty #bugbountytips #cybersecurity #AppSec
๐–๐ก๐š๐ญ ๐ข๐ฌ ๐Ÿ๐…๐€ ?

2FA is a security process in which users provide two different authentication factors to verify themselves. 2FA is implemented to better protect both a userโ€™s credentials and the resources the user can access.
[๐๐ฒ๐ฉ๐š๐ฌ๐ฌ ๐Ÿ] - ๐…๐จ๐ซ๐œ๐ž๐ ๐›๐ซ๐จ๐ฐ๐ฌ๐ข๐ง๐ 

Try accessing different endpoints directly with the available token generated from passing the 1st authentication mechanism.
[๐๐ฒ๐ฉ๐š๐ฌ๐ฌ ๐Ÿ] - ๐‘๐ž๐ฎ๐ฌ๐ข๐ง๐  ๐ญ๐จ๐ค๐ž๐ง

Try Reusing the Auth code sent to your phone number twice or thrice, If you can do so an attacker could use older OTP to bypass 2FA in the target account anytime in the future.
[๐๐ฒ๐ฉ๐š๐ฌ๐ฌ ๐Ÿ‘] - ๐‹๐ž๐š๐ค๐ž๐ ๐“๐จ๐ค๐ž๐ง๐ฌ

Sometime an application may leak an OPT in the response of a HTTP request responsible to generate an OTP on server side, the token leaked on a response from the web application can be used to bypass 2FA.
[๐๐ฒ๐ฉ๐š๐ฌ๐ฌ ๐Ÿ’] - ๐๐š๐ฌ๐ฌ๐ฐ๐จ๐ซ๐ ๐ซ๐ž๐ฌ๐ž๐ญ ๐…๐ฎ๐ง๐œ๐ญ๐ข๐จ๐ง๐š๐ฅ๐ข๐ญ๐ฒ

In almost all web applications the password reset function automatically logs the user into the application after the reset procedure is completed. That may lead to a 2FA Bypass.
[๐๐ฒ๐ฉ๐š๐ฌ๐ฌ ๐Ÿ“] - ๐‹๐š๐œ๐ค ๐จ๐Ÿ ๐‘๐š๐ญ๐ž ๐‹๐ข๐ฆ๐ข๐ญ

Developers often use rate limits to control the number of requests per user. If the rate limit is missing the attacker can bypass 2FA using bruteforce attacks.
[๐๐ฒ๐ฉ๐š๐ฌ๐ฌ ๐Ÿ”] - ๐‚๐’๐‘๐…/๐‚๐ฅ๐ข๐œ๐ค๐ฃ๐š๐œ๐ค๐ข๐ง๐ 

Check if there is a CSRF on enabling and Disabling 2FA or a Clickjacking vulnerability to disable the 2FA.
[๐๐ฒ๐ฉ๐š๐ฌ๐ฌ ๐Ÿ•] - ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐ฌ๐ž ๐Œ๐š๐ง๐ข๐ฉ๐ฎ๐ฅ๐š๐ญ๐ข๐จ๐ง

Change Response of 2FA validating request:
{"success":"false"} -> {"success":"true"}

or Status code:
[403 -> 200] or [401 -> 200]
[๐๐ฒ๐ฉ๐š๐ฌ๐ฌ ๐Ÿ–] - ๐‚๐ซ๐จ๐ฌ๐ฌ ๐“๐จ๐ค๐ž๐ง ๐”๐ฌ๐š๐ ๐ž

Try using the 2FA codes send to Account1 on Account2, This simple technique can sometimes lead to 2FA Bypass
[๐๐ฒ๐ฉ๐š๐ฌ๐ฌ ๐Ÿ—] - ๐”๐ฌ๐ข๐ง๐  ๐ƒ๐ข๐Ÿ๐Ÿ๐ž๐ซ๐ž๐ง๐ญ ๐€๐ฎ๐ญ๐ก๐ž๐ง๐ญ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐Œ๐ž๐ญ๐ก๐จ๐๐ฌ

Sometimes web developers forgot to enforce 2FA on login via google, Facebook, apple Etc, Which may allow an attacker to bypass 2FA.
We recently published an comprehensive article on Attacking 2FA in modern web apps.

Check it our here ๐Ÿ‘‡

snapsec.co/blog/Attackingโ€ฆ

โ€ข โ€ข โ€ข

Missing some Tweet in this thread? You can try to force a refresh
ใ€€

Keep Current with Snap Sec

Snap Sec Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @snap_sec

Feb 18
10 different techniques to Find and Bypass Open Redirect Vulnerabilities in Web Application.

[A Thread ๐Ÿงต]

#bugbounty #bugbountytips #cybersecurity #AppSec
[1/n]

๐–๐ก๐š๐ญ ๐ข๐ฌ ๐š๐ง ๐Ž๐ฉ๐ž๐ง ๐‘๐ž๐๐ข๐ซ๐ž๐œ๐ญ ๐•๐ฎ๐ฅ๐ง๐ž๐ซ๐š๐›๐ข๐ฅ๐ข๐ญ๐ฒ?

Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way.
[2/n]

๐‚๐จ๐ฆ๐ฆ๐จ๐ง ๐๐ฅ๐š๐œ๐ž๐ฌ ๐ญ๐จ ๐Ÿ๐ข๐ง๐ ๐Ž๐ฉ๐ž๐ง ๐‘๐ž๐๐ซ๐ข๐œ๐ญ๐ข๐จ๐ง:

login
register
logout
change site language
links in emails
Read 12 tweets
Jan 6
8 different techniques to Bypass Rate Limits in Web Applications and API's.

[A Thread ๐Ÿงต]

#bugbounty #bugbountytips #cybersecurity #AppSec
- What is Rate Limit

Rate limiting is a process to limiting the number of request an user can make to a web server in an span of time. This can be achieved by implementing IP based, Session Based rate limits on web server.

Bypasses ๐Ÿ‘‡
- Where to Look for Rate Limit Bugs

Place like :
- Login/Signup pages
- Register Pages
- 2FA codes
- Confirmation Codes

and any other request which if bruteforce will allow attacker to achieve anything malicious should be check for "No Rate Limit" issue.

Bypasses ๐Ÿ‘‡
Read 11 tweets
Dec 5, 2021
How to Look for "Insecure CORS Configuration" vulnerabilities.

[A thread ๐Ÿงต]

#appsec #bugbounty #bugbountytips #cybersecurity
[2/n]
What is Insecure CORS issue?

An insecure CORS configuration allows any website to trigger requests with user credentials to the target application and read the responses thus enabling attackers to perform privileged actions or to retrieve potential sensitive information
[3/n]

Basic Origin Reflection Test:

Req: Origin: evil[.]com
Res: Access-Control-Allow-Origin: evil[.]com

> In this test case check if your Origin Header is being reflected within the Access-Control-Allow-Origin Header. If yes, this may be a vulnerability.
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(