{% hint style="success" %}
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.
Get a hacker's perspective on your web apps, network, and cloud
Find and report critical, exploitable vulnerabilities with real business impact. Use our 20+ custom tools to map the attack surface, find security issues that let you escalate privileges, and use automated exploits to collect essential evidence, turning your hard work into persuasive reports.
{% embed url="https://pentest-tools.com/?utm_term=jul2024&utm_medium=link&utm_source=hacktricks&utm_campaign=spons" %}
Several times the back-end trust the Host header to perform some actions. For example, it could use its value as the domain to send a password reset. So when you receive an email with a link to reset your password, the domain being used is the one you put in the Host header.Then, you can request the password reset of other users and change the domain to one controlled by you to steal their password reset codes. WriteUp.
{% hint style="warning" %} Note that it's possible that you don't even need to wait for the user to click on the reset password link to get the token, as maybe even spam filters or other intermediary devices/bots will click on it to analyze it. {% endhint %}
Some times when you complete some verification correctly the back-end will just add a boolean with the value "True" to a security attribute your session. Then, a different endpoint will know if you successfully passed that check.
However, if you pass the check and your sessions is granted that "True" value in the security attribute, you can try to access other resources that depends on the same attribute but that you shouldn't have permissions to access. WriteUp.
Try to register as an already existent user. Try also using equivalent characters (dots, lots of spaces and Unicode).
Register an email, before confirming it change the email, then, if the new confirmation email is sent to the first registered email,you can takeover any email. Or if you can enable the second email confirming the firt one, you can also takeover any account.
{% embed url="https://yourcompanyname.atlassian.net/servicedesk/customer/user/login" %}
Developers might forget to disable various debugging options in the production environment. For example, the HTTP TRACE
method is designed for diagnostic purposes. If enabled, the web server will respond to requests that use the TRACE
method by echoing in the response the exact request that was received. This behaviour is often harmless, but occasionally leads to information disclosure, such as the name of internal authentication headers that may be appended to requests by reverse proxies.
Get a hacker's perspective on your web apps, network, and cloud
Find and report critical, exploitable vulnerabilities with real business impact. Use our 20+ custom tools to map the attack surface, find security issues that let you escalate privileges, and use automated exploits to collect essential evidence, turning your hard work into persuasive reports.
{% embed url="https://pentest-tools.com/?utm_term=jul2024&utm_medium=link&utm_source=hacktricks&utm_campaign=spons" %}
{% hint style="success" %}
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE)
Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Support HackTricks
- Check the subscription plans!
- Join the 💬 Discord group or the telegram group or follow us on Twitter 🐦 @hacktricks_live.
- Share hacking tricks by submitting PRs to the HackTricks and HackTricks Cloud github repos.