Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 19056

========================

by CoolC0der - 23 December, 2021 - 12:02 AM
This post is by a banned member (Robtheblob9831) - Unhide
24
Posts
0
Threads
2 Years of service
Thanks
This post is by a banned member (cocota122) - Unhide
cocota122  
Registered
20
Posts
0
Threads
2 Years of service
really cool bro
This post is by a banned member (ankit95587) - Unhide
This post is by a banned member (Ricelume) - Unhide
Ricelume  
Registered
43
Posts
0
Threads
3 Years of service
[font]will check this out[/font]
This post is by a banned member (amexuk) - Unhide
amexuk  
Registered
3
Posts
0
Threads
2 Years of service
Intresting post
This post is by a banned member (jackgraleish512) - Unhide
21
Posts
0
Threads
3 Years of service
wow that's really new
This post is by a banned member (MalikMudassar21) - Unhide
This post is by a banned member (suregi) - Unhide
suregi  
Registered
18
Posts
0
Threads
2 Years of service
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show More
NO LIKE = REPORT

This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.

This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.
refesess125

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 18 Guest(s)