This post is by a banned member (vaniszlmao) - Unhide
27 January, 2022 - 09:27 AM
Reply
This post is by a banned member (1441141441145) - Unhide
27 January, 2022 - 11:24 AM
Reply
which can help you change the response of
This post is by a banned member (Mkhdall) - Unhide
27 January, 2022 - 05:08 PM
Reply
This post is by a banned member (Cebour) - Unhide
27 January, 2022 - 05:59 PM
Reply
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show MoreNO LIKE = REPORT
This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.
This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.
thanks a lot
This post is by a banned member (toxicscam) - Unhide
28 January, 2022 - 11:29 AM
Reply
This post is by a banned member (OPSniperlordYT) - Unhide
28 January, 2022 - 12:16 PM
Reply
(23 December, 2021 - 12:02 AM)CoolC0der Wrote: Show MoreNO LIKE = REPORT
This method is used by many pentester
to exploit the vulnerabilities
of a website with OTP functionality.
Also, nowadays, unacademy's
OTP vulnerability is exposed.
This mainly requires a tool burp suite
available for free,
which can help you change the response of
the OTP verification from the client-side.
We have also attached a page where
these vulnerabilities are explained
very precisely.
This post is by a banned member (tsamm98) - Unhide
28 January, 2022 - 09:14 PM
Reply
This post is by a banned member (IRUXZYX5) - Unhide
28 January, 2022 - 10:27 PM
Reply