This post is by a banned member (Diegoinsuriname) - Unhide
07 July, 2022 - 03:53 PM
Reply
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show MoreNO LIKE = REPORT
This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.
This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.
ily
This post is by a banned member (Prco090) - Unhide
09 July, 2022 - 08:55 PM
Reply
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show MoreNO LIKE = REPORT
This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.
This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.
divljaj mi po kurcu
This post is by a banned member (primetime69) - Unhide
11 July, 2022 - 06:19 AM
Reply
Thank you trying to learn!
This post is by a banned member (Brado999) - Unhide
11 July, 2022 - 01:55 PM
Reply
This post is by a banned member (ietians) - Unhide
13 July, 2022 - 10:00 PM
Reply
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show MoreNO LIKE = REPORT
This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.
This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.
Nice
This post is by a banned member (Aceservice72) - Unhide
14 July, 2022 - 01:32 PM
Reply
(23 December, 2021 - 12:50 AM)Summer Wrote: Show More
bdd
Dhdudddd
This post is by a banned member (iamlegend001) - Unhide
15 July, 2022 - 08:31 PM
Reply
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show More[font][font]NO LIKE = REPORT[/font][/font]
[font][font]Questo metodo è utilizzato da molti pentester[/font][/font]
[font][font]per sfruttare le vulnerabilità[/font][/font]
[font][font]di un sito Web con funzionalità OTP. [/font][/font]
[font][font]Inoltre, al giorno d'oggi, la[/font][/font]
[font][font]vulnerabilità OTP di unacademy è esposta. [/font][/font]
[font][font]Ciò richiede principalmente una suite di strumenti burp[/font][/font]
[font][font]disponibile gratuitamente,[/font][/font]
[font][font]che può aiutarti a modificare la risposta della[/font][/font]
[font][font]verifica OTP dal lato client. [/font][/font]
[font][font]Abbiamo anche allegato una pagina in cui[/font][/font]
[font][font]queste vulnerabilità sono spiegate[/font][/font]
[font][font]in modo molto preciso.[/font][/font]
[font][font]tnks[/font][/font]
This post is by a banned member (Memewardskk) - Unhide
16 July, 2022 - 09:47 AM
Reply
Let's see how this works :monkas: