hacktricks/pentesting-web/reset-password.md
2024-02-10 17:52:19 +00:00

9.6 KiB

Reset/Forgotten Password Bypass

htARTE (HackTricks AWS Red Team Expert) qa'wI'pu' (HackTricks AWS Red Team Expert)!

HackTricks vItlhutlh:

HackenProof Discord qa'wI'pu' Discord qa'wI'pu' 'ej bug bounty hunters qa'wI'pu'!

Hacking Insights
Hacking tlhIngan Hol Hacking Hacking Hacking Hacking

Real-Time Hack News
Hacking Hacking Hacking Hacking Hacking Hacking

Latest Announcements
Hacking Hacking Hacking Hacking Hacking Hacking

qa'wI'pu' Discord 'ej qa'wI'pu' top hackers qa'wI'pu'!

Password Reset Token Leak Via Referrer

  • HTTP referer header password reset token leak URL 'e' 'e'. user password reset request 'e' third-party website link click 'e'.
  • Impact: Cross-Site Request Forgery (CSRF) attack potential account takeover.
  • References:

Password Reset Poisoning

  • Attackers Host header password reset requests manipulate reset link malicious site point.
  • Patch: $_SERVER['HTTP_HOST'] 'e' password reset URLs construct 'e' $_SERVER['SERVER_NAME'] 'e'.
  • Impact: reset tokens leak attackers account takeover lead.
  • Mitigation Steps:
  • Host header whitelist allowed domains validate.
  • secure, server-side methods absolute URLs generate use.
  • References:

Password Reset By Manipulating Email Parameter

  • Attackers password reset request additional email parameters divert reset link manipulate.
  • Mitigation Steps:
  • email parameters parse validate server-side properly.
  • injection attacks prevent statements prepared queries parameterized use.
  • References:

Changing Email And Password of any User through API Parameters

  • Attackers API requests email and password parameters modify account credentials change.
  • Mitigation Steps:
  • parameter validation authentication checks strict Ensure.
  • suspicious activities detect respond robust logging and monitoring Implement.
  • Reference:

No Rate Limiting: Email Bombing

  • password reset requests rate limiting Lack email bombing lead reset emails user overwhelming.
  • Mitigation Steps:
  • IP address user account rate limiting Implement.
  • automated abuse prevent CAPTCHA challenges Use.
  • References:

Find out How Password Reset Token is Generated

  • token generation method pattern Understanding tokens brute-forcing predicting lead.
  • Mitigation Steps:
  • token generation cryptographic methods strong Use.
  • predictability prevent length randomness sufficient Ensure.
  • Tools: Burp Sequencer tokens randomness analyze Use.

Guessable GUID

  • GUIDs (e.g., version 1) guessable predictable GUIDs brute-force attackers valid reset tokens generate.
  • Mitigation Steps:
  • GUID version 4 randomness Use additional security measures implement versions other.
  • Tools: guidtool GUIDs generating analyzing Use.

Response Manipulation: Replace Bad Response With Good One

  • HTTP responses manipulating error messages restrictions bypass.
  • Mitigation Steps:
  • response integrity ensure checks server-side Implement.
  • man-in-the-middle attacks prevent HTTPS channels communication secure Use.
  • Reference:

Using Expired Token

  • expired tokens password reset used testing.
  • Mitigation Steps:
  • token expiration policies strict Implement.
  • token expiry server-side validate Ensure.

Brute Force Password Reset Token

  • reset token brute-force attempting tools Burpsuite IP-Rotator bypass IP-based rate limits using.
  • Mitigation Steps:
  • account lockout mechanisms rate-limiting robust Implement.
  • brute-force attacks indicative activities suspicious Monitor.

Try Using Your Token

  • attacker's reset token victim's email conjunction used testing.
  • Mitigation Steps:
  • tokens user-specific attributes user session bound Ensure.

Session Invalidation in Logout/Password Reset

  • sessions invalidated user logs out password reset user when Ensuring.
  • Mitigation Steps:
  • session management proper Implement.
  • logout password reset upon invalidated sessions all Ensure.

Session Invalidation in Logout/Password Reset

  • reset tokens expiration time tokens invalid become.
  • Mitigation Steps:
  • reset tokens expiration time reasonable Set **server-side

References

Join HackenProof Discord server to communicate with experienced hackers and bug bounty hunters!

Hacking Insights
Engage with content that delves into the thrill and challenges of hacking

Real-Time Hack News
Keep up-to-date with fast-paced hacking world through real-time news and insights

Latest Announcements
Stay informed with the newest bug bounties launching and crucial platform updates

Join us on Discord and start collaborating with top hackers today!

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks: