ATO

[ ] password reset

  • try sqli

Host Header Manipulation

  • Host Header Poisoning

    • Example: Host: evil.com

  • Load Balancer Host Header Override

    • Example: Host: target.com, X-Forwarded-Host: evil.com

    • Description: If a load balancer is present, it may modify the Host header, allowing the attacker to control or manipulate the request.

Sensitive Information Leakage

  • Check for Leakages: Inspect server responses for sensitive information, such as reset password tokens that may inadvertently be exposed.

Header Poisoning

  • Referer Header Poisoning

    • Example: Referer: evil.com

  • Origin Header Poisoning

    • Example: ORIGIN: evil.com

Bypassing Regular Expressions

  • Craft payloads that may bypass security checks:

    • target.com.evil.com

    • eviltarget.com

    • evil.com/target.com

    • evil.com%23@target.com

    • evil.com%25%32%33@target.com

SMTP Injection & HTTP Parameter Pollution

  • Example Payloads:

CRLF Injection with HPP

Unix Line Endings

  • Carbon Copy (CC) with HPP Chain:

Blind Carbon Copy (BCC) with HPP Chain

Windows Line Endings

Carbon Copy (CC) with HPP Chain

Blind Carbon Copy (BCC) with HPP Chain

Array of Emails

  • Example Payload:

Parameter Bruteforce using Arjun

[ ] OAuth to Account takeover

[ ] Pre-Account Takeover

A pre-account takeover occurs when an attacker creates a user account using one signup method, and the victim creates another account using a different signup method with the same email address. This can happen if the application fails to validate email addresses properly.

[ ] Account takeover by utilizing sensitive data exposure

[ ] login

[ ] XSS to Account Takeover

if the application does not use auth token or you can't access the cookies because the "HttpOnly" flag, you can obtain the CSRF token and craft a request to change the user's email or password

[ ] CSRF to Account Takeover

[ ] IDOR to Account Takerover

[ ] Account takeover by Response & Status code Manipulation

[ ] Account takeover by exploiting Weak cryptography

  • check the cryptography algorthim in the token of reset password

[ ] Password or email change function

[ ] Sing-Up Function

[ ] Rest Token

[ ] Host Header Injection

[ ] CORS Misconfiguration to Account Takeover

If the page contains CORS missconfigurations you might be able to steal sensitive information from the user to takeover his account or make him change auth information for the same purpose:

[ ] Account takeover via leaked session cookie

[ ] HTTP Request Smuggling to ATO

[ ] Bypassing Digits origin validation which leads to account takeover

[ ] Top ATO report in hackerone

Last updated