5 methods to bypass authentication. via @AnonY0gi

(thread)
1. Response manipulation

- it usually happens when the server doesn't check client-side input
2. OTP/MFA/2FA code leak in the response

- it usually happens when the verification code is leaked in the response
3. Brute forcing OTP/MFA/2FA

- it usually happens when there is no rate limit at code verification input
4. Sensitive information in JS code or code repos.

- it usually happens when hard-coded credentials, keys and secrets are leaked via code
5. Host header injection

- sometimes, adding headers like X-Forwarded-Host, can leak/send sensitive responses to attackers.
6. All these 5 methods have been wonderfully exemplified in a video by @AnonY0gi. Check him out.

Like, retweet, and follow me for more posts like this.

#infosec #pentesting #cybersecurity #appsec #bugbounty #bugbountytips

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with 🇷🇴 cristi

🇷🇴 cristi Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @CristiVlad25

Dec 30
5 sources to learn smart contract hacking by example.

(thread)
1. SolidityScan via @SolidityScan

Source: blog.solidityscan.com
2. Immunefi via @immunefi

Source: medium.com/immunefi
Read 8 tweets
Dec 23
How I do subdomain enumeration by aggregating multiple tools in a bash script. The script contains the following tools:

(thread)
1. findomain @FindomainApp

- takes: -t $1 and adds the findings to a new file
2. assetfinder @TomNomNom

- takes: $1, looks for -subs-only, sorts unique, and appends to the above file
Read 8 tweets
Dec 22
Paid to Hack!

How much money can you make in cybersecurity?

(thread)
1. Cybersecurity Analyst (~$69K - $112K)
2. Penetration Tester (~$75K - $128K)
Read 11 tweets
Dec 21
Full infection flow, brought to you by OpwnAI, as affectionately dubbed by @_CPResearch_

(thread)
1. Researchers at Check Point used AI models, including OpenAI's ChatGPT and Codex, to create a full infection flow for a cyber attack without writing any code themselves.
2. The attack began with a spear-phishing email, impersonating a hosting company, generated by #ChatGPT
Read 7 tweets
Dec 20
How to use gobuster in pentesting. I used #AI to summarize my video (results below).

(thread)
1. I downloaded the subtitle of the video, convert it to text, then used #gpt3 to summarize it. Here's the video and below is the summary. I'm pretty amazed of the results.

2. Go Buster is a tool used for penetration testing and bruteforcing web directories.

It should only be used on targets with permission to do so.
Read 8 tweets
Dec 19
5 tips on how I used Burp Pro in my 85+ pentests in 2022:

(thread)
1. Use “TLS Pass Through” to cancel out as much noise as possible, and save your configuration to file. Here’s a small portion of my personal config.

Alternatively, you can use scoping, but I find that as being more restrictive.
2. Use regex filtering with negative search in “HTTP History” and Target “Site map” to further clean your testing. Here’s how my personal config looks like.
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(