An open redirect occurs when a flaw in a website’s client-side or server-side code allows an attacker to redirect a user to a malicious site by abusing a legitimate website’s redirect functionality. This is often used in phishing attacks because the victim sees a trusted domain in the URL before being redirected.
Exploitation in Practice
Discovery
Look for URL parameters that look like paths or URLs. For example:
If there are no obvious parameters, try fuzzing for hidden ones using a tool like ffuf or Burp Suite.
A good parameter wordlist is burp-parameter-names.txt. If you have SecLists installed, you can find it at /usr/share/seclists/Discovery/Web-Content. On Kali Linux, install it with: