-
WAF Bypass
-
Direct Server Access
- Searh on shodan or Censys for any Domain/Sub that have WAF and see by wafw00f tool If this IP dosen't Implement WAF.
-
Content Spoofing
-
Broken Link Hijacking
- Use this extension to find broken links.
-
Email HTML Injection
- I was able to achieve this by injecting the following code into all input fields I encountered: <a href="https://evil.com">Click Here to get $100</a>. I then triggered an action on the website that resulted in an email being sent to me. To my surprise, I noticed that my name was rendered as HTML content in the email.
-
Basic SSTI
- It just non-high Impact SSTI to my knowledge.
-
Sensitive Data Exposure
- EXIF Geolocation Data Not Stripped From Uploaded Images
-
Via localStorage/sessionStorage
- After logging out or logging in into the application see any sensitive information on the local storge
-
Token Leakage via Referer
- Try requesting the reset password URL for example in the Browser and after that try to visit the main website while intercepting to see if there's the token is leaked via referer header
-
Password Reset Token Sent Over HTTP
- Check when initiating a Password Reset URL if it sends over HTTP non HTTPs
-
Sensitive Token in URL
- See if there's any sensitive token in the URL such as the session token or something
-
Pay-Per-Use Abuse
- Search for any API Token or Any Sensitive Endpoints and try to making the PoC by making a 200 OK request to these things
-
Weak Password Reset Implementation
-
Token is Not Invalidated After Use
- In a secure password reset process, the token provided for resetting the password should be invalidated immediately after it is successfully used. This one-time use property ensures that the token cannot be reused by an attacker to repeatedly reset the password and gain unauthorized access to the account.
- To fix this issue, the application should be modified to invalidate the password reset token as soon as it is used to reset the password.
- Username/Email Enumeration
- Open Redirect
-
Server-Side Request Forgery (SSRF)
- External
-
Cross-Site Scripting (XSS)
-
Data URI
- Use the XSS Data URI Payload from here!
-
Referer
- Referer: http://www.google.com/search?hl=en&q=c5obc'+alert(1)+'p7yd5
-
Misconfigured DNS
-
Zone Transfer
- Just use this website for testing the targeted domain.
-
Mail Server Misconfiguration
-
Email Spoofing - Missing DMARC
- Use this website for check the domain is vulnerable?
- Use this website for the PoC
-
Lack of Password Confirmation
-
Delete Account
- As simple it is, Just see if there's any confirmation when deleting your Account
-
No Rate Limiting on Form
- Registration
- Login
- Email-Triggering
- SMS-Triggering
-
Broken Authentication and Session Management
-
Failure to Invalidate Session on Logout
- Capture a request while authenticated using Burp. Then, log out from the application using the browser. Attempt to resend the request using Burp and observe if it is successful or not.
- Failure to Invalidate Session on Reset Password
-
Cleartext Transmission of Session Token
- Observe that the session is send as PlainText without existance of `secure` flag
curl http://example.com/path/to/resource
- Registration over HTTP
- Login over HTTP
-
No Password Policy
- Just type 1 or 123 for the password and observe that you can register successfully.
-
2FA Implementation
-
2FA Secret Remains Obtainable After 2FA is Enabled
- In a secure 2FA implementation, the 2FA secret should not be accessible or retrievable after it has been used to set up 2FA. It's usually shown only once during the setup process and should not be available for retrieval or viewing later.
- To fix this bug, the application should ensure that the 2FA secret is only shown during the initial setup and is not retrievable afterward. Additionally, the URL where the secret is accessible should be protected to prevent unauthorized access. This helps ensure the security of user accounts that have 2FA enabled.
-
2FA Secret Cannot be Rotated
- In a secure 2FA implementation, users should have the option to change their 2FA secret if they suspect it has been compromised or for periodic security best practices.
- To address this issue, the application should implement a feature that allows users to change or rotate their 2FA secret. This feature should be easily accessible within the account settings, and the old secret should be invalidated when a new one is generated to ensure security.
-
CAPTCHA Bypass
- Use this tricks to bypass CAPTCHA
-
Lack of Security Headers
-
Missing Secure or HTTPOnly Cookie Flag
- Check if the session token is missing the HTTPonly falg and be sure if it is really the session token :)
-
Cache-Control for a Sensitive Page
- Open any sensitive-response page on your browser and capture it request in burp. Observe that there's not cache-control headers in the response or it don't expire.
Try send this request in Burp after closing your browser and observe that you can see the Sensitive Information.
- 1. Utilize the Bugcrowd email alias to generate emails.
2. Employ Intruder to expedite the process of repeating the requests.
3. Refer to HackTricks notes for bypassing rate limits.