Email Verification Bypass
Last updated
Last updated
Register an account - Login with this account and intercept the success login response
Register a victim account - it will prompt to a 2FA code but we don't have access to that email
Go back to login with the email
Capture the login request - Alter the response to success response
Intercept change email request and send it to repeater
Send the request at least 2 times so send it to the repeater again
Repeater 1
Repeater 2
Create group to be able to send the two requests in the same time
Send group in parallel
Modify the email
parameter from attacker@gmail.com
to a different email address (for this example, victim@gmail.com)
Intercept the request
Remove the token
Change STATUS to “VERIFIED,” refresh the page, and gain access to the solutions without verifying the address
The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.