mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-14 17:07:34 +00:00
GitBook: [master] 2 pages modified
This commit is contained in:
parent
0eef8b5a63
commit
7b64b4fca5
2 changed files with 6 additions and 2 deletions
|
@ -421,6 +421,6 @@
|
|||
* [1911 - Pentesting fox](1911-pentesting-fox.md)
|
||||
* [Online Platforms with API](online-platforms-with-api.md)
|
||||
* [Phising Documents](phising-documents.md)
|
||||
* [Reset Password Bypass](reset-password.md)
|
||||
* [Reset/Forgoten Password Bypass](reset-password.md)
|
||||
* [Stealing Sensitive Information Disclosure from a Web](stealing-sensitive-information-disclosure-from-a-web.md)
|
||||
|
||||
|
|
|
@ -1,4 +1,6 @@
|
|||
# Reset Password Bypass
|
||||
# Reset/Forgoten Password Bypass
|
||||
|
||||
## HTTP Headers
|
||||
|
||||
Sometimes in order to reset a password you contact an api endpoint and **send the email you want to reset the password**, like in the following example:
|
||||
|
||||
|
@ -9,3 +11,5 @@ For example, in this case if could send the reset password email to _something@g
|
|||
|
||||
Example from [https://medium.com/@abhishake100/password-reset-poisoning-to-ato-and-otp-bypass-1a3b0eba5491](https://medium.com/@abhishake100/password-reset-poisoning-to-ato-and-otp-bypass-1a3b0eba5491)
|
||||
|
||||
In other occasions you can manage to obtain the **same** **results** modifying the domain used in the **Referer header like in** [**here**](https://medium.com/bugbountywriteup/fun-with-header-and-forget-password-without-that-nasty-twist-cbf45e5cc8db)**.**
|
||||
|
||||
|
|
Loading…
Reference in a new issue