ATO
[ ] password reset
try sqli
Host Header Manipulation
Host Header Poisoning
Example:
Host: evil.com
Load Balancer Host Header Override
Example:
Host: target.com,X-Forwarded-Host: evil.comDescription: If a load balancer is present, it may modify the Host header, allowing the attacker to control or manipulate the request.
Sensitive Information Leakage
Check for Leakages: Inspect server responses for sensitive information, such as reset password tokens that may inadvertently be exposed.
Header Poisoning
Referer Header Poisoning
Example:
Referer: evil.com
Origin Header Poisoning
Example:
ORIGIN: evil.com
Bypassing Regular Expressions
Craft payloads that may bypass security checks:
target.com.evil.comeviltarget.comevil.com/target.comevil.com%23@target.comevil.com%25%32%33@target.com
SMTP Injection & HTTP Parameter Pollution
Example Payloads:
CRLF Injection with HPP
Unix Line Endings
Carbon Copy (CC) with HPP Chain:
Blind Carbon Copy (BCC) with HPP Chain
Windows Line Endings
Carbon Copy (CC) with HPP Chain
Blind Carbon Copy (BCC) with HPP Chain
Array of Emails
Example Payload:
Parameter Bruteforce using Arjun
[ ] OAuth to Account takeover
[ ] Pre-Account Takeover
A pre-account takeover occurs when an attacker creates a user account using one signup method, and the victim creates another account using a different signup method with the same email address. This can happen if the application fails to validate email addresses properly.
[ ] Account takeover by utilizing sensitive data exposure
[ ] login
[ ] XSS to Account Takeover
if the application does not use auth token or you can't access the cookies because the "HttpOnly" flag, you can obtain the CSRF token and craft a request to change the user's email or password
[ ] CSRF to Account Takeover
[ ] IDOR to Account Takerover
[ ] Account takeover by Response & Status code Manipulation
[ ] Account takeover by exploiting Weak cryptography
check the cryptography algorthim in the token of reset password
[ ] Password or email change function
[ ] Sing-Up Function
[ ] Rest Token
[ ] Host Header Injection
[ ] CORS Misconfiguration to Account Takeover
If the page contains CORS missconfigurations you might be able to steal sensitive information from the user to takeover his account or make him change auth information for the same purpose:
[ ] Account takeover via leaked session cookie
[ ] HTTP Request Smuggling to ATO
[ ] Bypassing Digits origin validation which leads to account takeover
[ ] Top ATO report in hackerone
Last updated