"Protect Your Account: Zero-Click Account Takeover For Admin Support Through Password Update"

2 months ago 28
BOOK THIS SPACE FOR AD
ARTICLE AD

Shari7a0x

السلام عليكم

.بِسْم اللَّه الرَّحْمن الرَّحِيم . . اللَّهمَّ صَلِّ وَسلَّم وبارك على نَبِينَا مُحمَّد

My Name is El-Sayed Mohammed (Shari7a0x) , I will show you How I got a Zero-Click Account Takeover For Admin Support Through Password Update in a Public Bug Bounty Program on HackerOne.

first Read this https://medium.com/@shari7a0x/how-we-got-for-a-blind-stored-xss-to-ato-2e9b939055ec I explained in it How I reached Admin Support.

After the Program Resolved the bug I tried to take account again

I tried to inject Blind Xss again but nothing.

then I Opened domain support to try the same password, but it was wrong.

what about resetting the password?

I got two options .

reset link or put the answer for back up question .

I try to guess the answer and It’s okay .

I tried to put new password but nothing happened and got didn't update password .

I opened burp and tried to catch the request and got it then moved it to repeater .

I see request It didn't have any data ?

Then i tried to but same info in request and guess what happened password changed

I logged in account to get random user to try again the bug ,

guess what bug worked again without putting answer the question.

I reported and got two different results

lol
lol again

Now I want to know what is ture ???

thanks for reading .

Follow me In Twitter , Linked in

Read Entire Article