2FA Bypass Techniques thread π₯ππ
-------------------------
π2FA Code Leakage in Response:
You can intercept otp using burpsuite and inspect http response and check if the 2FA code leaked
#hackerone #BugBounty #bugbountytips #BugBountyTip
-------------------------
π2FA Code Leakage in Response:
You can intercept otp using burpsuite and inspect http response and check if the 2FA code leaked
#hackerone #BugBounty #bugbountytips #BugBountyTip
2. JS File Analysis:
----------------
πAnalyze all the JS Files that are referred in the response to see if any JS file contains information that can help bypass 2FA code.
#hackerone #BugBounty #bugbountytips
#hackeronereport #Bugbountywriteupspublished #BugBountyTip
----------------
πAnalyze all the JS Files that are referred in the response to see if any JS file contains information that can help bypass 2FA code.
#hackerone #BugBounty #bugbountytips
#hackeronereport #Bugbountywriteupspublished #BugBountyTip
3. Lack of brute-Force Protection:
-----------------
πtype 2FA code and capture request using burpsuite
πsend request to intruder and send request for 100β200 times .
πAt 2FA Code Verification page, try to brute-force for valid 2FA and see if there is any success.
-----------------
πtype 2FA code and capture request using burpsuite
πsend request to intruder and send request for 100β200 times .
πAt 2FA Code Verification page, try to brute-force for valid 2FA and see if there is any success.
4. Missing 2FA Code Integrity Validation:
-------------------
πRequest a 2FA code from the attackerβs account.
πUse this valid 2FA code in the victim 2FA Request and see if it bypasses the 2FA protection.
#hackerone #BugBounty #bugbountytips
#bugbountytips
#bugbountytip
-------------------
πRequest a 2FA code from the attackerβs account.
πUse this valid 2FA code in the victim 2FA Request and see if it bypasses the 2FA protection.
#hackerone #BugBounty #bugbountytips
#bugbountytips
#bugbountytip
5.2FA Refer Check Bypass:
----------------
πnavigate to the page which comes after 2FA or any other authenticated page of the application.
If there is no success, change the refer header to the 2FA page URL.
#hackerone #BugBounty #bugbountytips
#bugbountytips
#bugbountytip
----------------
πnavigate to the page which comes after 2FA or any other authenticated page of the application.
If there is no success, change the refer header to the 2FA page URL.
#hackerone #BugBounty #bugbountytips
#bugbountytips
#bugbountytip
6. Enabling 2FA Doesnβt Expire Previous Session:
-------------------
In this scenario, if an attacker hijacks an active session before 2FA, it is possible to carry out all functions without a need for 2FA.
#hackerone #BugBounty #bugbountytips
#bugbountytips
#bugbountytip
-------------------
In this scenario, if an attacker hijacks an active session before 2FA, it is possible to carry out all functions without a need for 2FA.
#hackerone #BugBounty #bugbountytips
#bugbountytips
#bugbountytip
7. Clickjacking on 2FA Disable Feature:
--------------------
Try to iframe the page where the application allows a user to disable 2FA.
#hackerone #BugBounty #bugbountytips
#bugbountytip
--------------------
Try to iframe the page where the application allows a user to disable 2FA.
#hackerone #BugBounty #bugbountytips
#bugbountytip
8. Response Manipulation:
----------------
π Check response of the 2FA Request.
π If you observe βSuccessβ:false, change this to βSuccessβ:true and see if it bypasses the 2FA.
#hackerone #BugBounty #bugbountytips
#bugbountytip
----------------
π Check response of the 2FA Request.
π If you observe βSuccessβ:false, change this to βSuccessβ:true and see if it bypasses the 2FA.
#hackerone #BugBounty #bugbountytips
#bugbountytip
9. Status Code Manipulation:
----------------
πIf the Response Status Code is 4xx like 401, 402, etc.
π Change the response Status Code to β200 OKβ and see if it bypasses the 2FA.
----------------
πIf the Response Status Code is 4xx like 401, 402, etc.
π Change the response Status Code to β200 OKβ and see if it bypasses the 2FA.
10. 2FA Code Reusability:
----------------
π Request a 2FA code and use it.
π Now, re-use the same 2FA code in another session and if it authenticated successfully, thatβs a potential issue.
#hackerone #BugBounty
#bugbountytips
#bugbountytip
----------------
π Request a 2FA code and use it.
π Now, re-use the same 2FA code in another session and if it authenticated successfully, thatβs a potential issue.
#hackerone #BugBounty
#bugbountytips
#bugbountytip
11. CSRF on 2FA Disable Feature:
---------------
π Navigate to 2FA Page and click on βDisable 2FAβ and capture this request with Burp Suite & generate a CSRF PoC.
π Send this PoC to the victim, and check if CSRF happens successfully and remove the 2FA from the victim account.
---------------
π Navigate to 2FA Page and click on βDisable 2FAβ and capture this request with Burp Suite & generate a CSRF PoC.
π Send this PoC to the victim, and check if CSRF happens successfully and remove the 2FA from the victim account.
Loading suggestions...