Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 19056

========================

by CoolC0der - 23 December, 2021 - 12:02 AM
This post is by a banned member (Someone3339) - Unhide
16
Posts
0
Threads
2 Years of service
Tysm.
This post is by a banned member (ahayasuh) - Unhide
This post is by a banned member (kvirike) - Unhide
kvirike  
Registered
48
Posts
0
Threads
2 Years of service
tytyy
This post is by a banned member (armyman90) - Unhide
armyman90  
Registered
4
Posts
0
Threads
2 Years of service
worked
This post is by a banned member (willsmith705) - Unhide
This post is by a banned member (tmz619) - Unhide
This post is by a banned member (Caroc12) - Unhide
Caroc12  
Registered
15
Posts
0
Threads
2 Years of service
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show More
NO LIKE = REPORT

This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.

This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.
Thanks
This post is by a banned member (DVyper6969) - Unhide
5
Posts
0
Threads
2 Years of service
This is a pretty well known method

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 20 Guest(s)