reset_password_checklist
[ ] a lot of ideas in this article by omer hesham
https://medium.com/bugbountywriteup/hubspot-full-account-takeover-in-bug-bounty-4e2047914ab5[ ] Use Your Token on Victims Email
POST /reset
...
...
email=victim@gmail.com&token=$YOUR-TOKEN$
[ ] Host Header Injection
POST /reset
Host: attacker.com
...
email=victim@gmail.com[ ] HTML injection in Host Header
POST /reset
Host: attacker">.com
...
email=victim@gmail.com[ ] Leakage of Password reset in Referer Header
Referrer: https://website.com/reset?token=1234[ ] Using Companies Email
[ ] CRLF in URL
[ ] HTML injection in Email
[ ] Remove token
[ ] Change it to 0000
[ ] Use Null Value
[ ] try an array of old tokens
[ ] SQLi bypass
[ ] Request Method / Content Type
[ ] Response Manipulation
[ ] Massive Token
[ ] Crossdomain Token Usage
[ ] Leaking Reset Token in Response Body [ ] change 1 char at the begin/end to see if the token is evaluated [ ] use unicode char jutzu to spoof email address [ ] look for race conditions [ ] try to register the same mail with different TLD (.eu,.net etc)