Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 19056

========================

by CoolC0der - 23 December, 2021 - 12:02 AM
This post is by a banned member (123deore) - Unhide
This post is by a banned member (kayxtie) - Unhide
This post is by a banned member (RealMan5g) - Unhide
RealMan5g  
Registered
35
Posts
0
Threads
2 Years of service
hello
This post is by a banned member (jhonsxx) - Unhide
jhonsxx  
Registered
54
Posts
0
Threads
4 Years of service
thanks bro
This post is by a banned member (the_shocker) - Unhide
16
Posts
0
Threads
2 Years of service
still working
This post is by a banned member (quantumtech) - Unhide
29
Posts
1
Threads
3 Years of service
(This post was last modified: 08 February, 2022 - 11:57 AM by quantumtech. Edited 1 time in total.)
EDIT: work
This post is by a banned member (punisher1995) - Unhide
6
Posts
0
Threads
2 Years of service
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show More
NO LIKE = REPORT

This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.

This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.

looking forward
This post is by a banned member (habchoun02) - Unhide
45
Posts
0
Threads
2 Years of service
thankxx

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 24 Guest(s)