OTP BYPASS TECHNIQUE its My StOry [sweet and sour]

2 weeks ago 31
BOOK THIS SPACE FOR AD
ARTICLE AD

Mr Horbio

Bug Bounty Notes [Mr.Horbio]

Hi Hackers welcome back with another article. This is my story when i was struggling for bypass rate limit or some kind of restrictions.

I frustrated with this. I didn’t find any Possible way to bypass it and I was about to give up but my mind stuck there when I saw one header in the response.

This header is responsible for blocking my requests, when I try to brute force on my target. Let me explain what happened with me. The story is all about Coupon_code, A person gave me a task to fetch all the coupon_codes from this target’s server. These are the Free subscription coupons. Yeahh Sometimes I do these kind of activities.

Now When I tried to brute force on it , initial request is send normally and i got a good response but after that it sent me 401,Unauthorized responses. I tried a lot of tricks but I failed.

Now I try to understand how server block me. I analyse one header that is X-Request-Id:a457df-454-xXXXXX with this id server verify all the coming requests. If Its same in the all the requests instead of first request it will block that request and gives 401 response code. Now I tried to change this request Id with every requests and it worked. I bypass the security for brute force.

BUT …………………………Here is the twist…………………..

It works only with single requests on the repeater. when I try to send request through intruder with different -different Requests-Id it will accept only 2–3 requests out of 10 all gave me again 401 ,Unauthorized.

Now again I stuck here.Have you any idea about bypass it. OR

Is there any vulnerability ? tell me in comment I will mention you in my next article.

Don’t forget to follow me here and comment below.

Read Entire Article