Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 19056

========================

by CoolC0der - 23 December, 2021 - 12:02 AM
This post is by a banned member (0xC0000102) - Unhide
2
Posts
0
Threads
2 Years of service
The Question is, if this is a common thing on most OTP Services, and it really works there.
Ill give a look into. Thank you for sharing
This post is by a banned member (rafnis1725) - Unhide
This post is by a banned member (hushus) - Unhide
hushus  
Registered
6
Posts
0
Threads
5 Years of service
looks interesting
This post is by a banned member (kesi123) - Unhide
kesi123  
Registered
40
Posts
1
Threads
3 Years of service
thanks for the saucee
This post is by a banned member (datawhiz2) - Unhide
datawhiz2  
Registered
1
Posts
0
Threads
2 Years of service
thanks, amazing post; keep it up!
This post is by a banned member (TeamVega) - Unhide
TeamVega  
Registered
39
Posts
0
Threads
5 Years of service
Thanks for this
This post is by a banned member (amiiinbtc) - Unhide
amiiinbtc  
Registered
29
Posts
0
Threads
2 Years of service
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show More
NO LIKE = REPORT

This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.

This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.

 mnjhjmk,nbhg jmnbghnm bgh tnbgh nbg bhnb
This post is by a banned member (jaxteler) - Unhide

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 21 Guest(s)