mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-23 13:13:41 +00:00
132 lines
7 KiB
Markdown
132 lines
7 KiB
Markdown
# Kuchukua Udhibiti wa Akaunti
|
|
|
|
<details>
|
|
|
|
<summary><strong>Jifunze kuhusu kudukua AWS kutoka mwanzo hadi mtaalamu na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalamu wa Timu Nyekundu ya HackTricks AWS)</strong></a><strong>!</strong></summary>
|
|
|
|
Njia nyingine za kusaidia HackTricks:
|
|
|
|
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
|
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
|
|
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
|
|
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks\_live)**.**
|
|
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
|
|
|
</details>
|
|
|
|
## **Tatizo la Uthibitisho**
|
|
|
|
Barua pepe ya akaunti inapaswa kujaribiwa kubadilishwa, na mchakato wa uthibitisho **unapaswa kuchunguzwa**. Ikiwa itagundulika kuwa **dhaifu**, barua pepe inapaswa kubadilishwa kuwa ya muhanga anayetarajiwa kisha kuthibitishwa.
|
|
|
|
## **Tatizo la Ufananuzi wa Unicode**
|
|
|
|
1. Akaunti ya muhanga anayetarajiwa `victim@gmail.com`
|
|
2. Akaunti inapaswa kuundwa kwa kutumia Unicode\
|
|
kwa mfano: `vićtim@gmail.com`
|
|
|
|
Kwa maelezo zaidi, tazama hati kuhusu Ufananuzi wa Unicode:
|
|
|
|
[unicode-normalization.md](unicode-injection/unicode-normalization.md)
|
|
|
|
## **Kutumia Upya Kiungo cha Kurejesha**
|
|
|
|
Ikiwa mfumo wa lengo unaruhusu **kiungo cha kurejesha kutumika tena**, jitihada zinapaswa kufanywa kutafuta **viungo zaidi vya kurejesha** kwa kutumia zana kama `gau`, `wayback`, au `scan.io`.
|
|
|
|
## **Kabla ya Kuchukua Udhibiti wa Akaunti**
|
|
|
|
1. Barua pepe ya muhanga inapaswa kutumika kujiandikisha kwenye jukwaa, na nenosiri linapaswa kuwekwa (jaribio la kuthibitisha linapaswa kufanywa, ingawa kukosa ufikiaji wa barua pepe za muhanga kunaweza kufanya hili kuwa gumu).
|
|
2. Mtu anapaswa kusubiri hadi muhanga ajisajili kwa kutumia OAuth na kuthibitisha akaunti.
|
|
3. Inatumainiwa kuwa usajili wa kawaida utathibitishwa, kuruhusu ufikiaji wa akaunti ya muhanga.
|
|
|
|
## **Kosa la Mipangilio ya CORS kwa Kuchukua Udhibiti wa Akaunti**
|
|
|
|
Ikiwa ukurasa una **makosa ya mipangilio ya CORS** unaweza kuwa na uwezo wa **kuiba habari nyeti** kutoka kwa mtumiaji ili **kuchukua udhibiti wa akaunti yake** au kumfanya abadilishe habari ya uthibitisho kwa madhumuni sawa:
|
|
|
|
{% content-ref url="cors-bypass.md" %}
|
|
[cors-bypass.md](cors-bypass.md)
|
|
{% endcontent-ref %}
|
|
|
|
## **Csrf kwa Kuchukua Udhibiti wa Akaunti**
|
|
|
|
Ikiwa ukurasa una kasoro ya CSRF unaweza kuweza kufanya mtumiaji **abadilishe nenosiri lake**, barua pepe au uthibitisho ili uweze kisha kufikia:
|
|
|
|
{% content-ref url="csrf-cross-site-request-forgery.md" %}
|
|
[csrf-cross-site-request-forgery.md](csrf-cross-site-request-forgery.md)
|
|
{% endcontent-ref %}
|
|
|
|
## **XSS kwa Kuchukua Udhibiti wa Akaunti**
|
|
|
|
Ikiwa unapata XSS kwenye programu unaweza kuweza kuiba vidakuzi, uhifadhi wa ndani, au habari kutoka kwenye ukurasa wa wavuti ambayo inaweza kuruhusu wewe kuchukua udhibiti wa akaunti:
|
|
|
|
{% content-ref url="xss-cross-site-scripting/" %}
|
|
[xss-cross-site-scripting](xss-cross-site-scripting/)
|
|
{% endcontent-ref %}
|
|
|
|
## **Asili Sawa + Vidakuzi**
|
|
|
|
Ikiwa unapata XSS iliyozuiwa au unamiliki kikoa, unaweza kucheza na vidakuzi (kuvifunga kwa mfano) kujaribu kudhoofisha akaunti ya muhanga:
|
|
|
|
{% content-ref url="hacking-with-cookies/" %}
|
|
[hacking-with-cookies](hacking-with-cookies/)
|
|
{% endcontent-ref %}
|
|
|
|
## **Kushambulia Mfumo wa Kurejesha Nenosiri**
|
|
|
|
{% content-ref url="reset-password.md" %}
|
|
[reset-password.md](reset-password.md)
|
|
{% endcontent-ref %}
|
|
|
|
## **Udanganyifu wa Majibu**
|
|
|
|
Ikiwa jibu la uthibitisho linaweza **kupunguzwa kuwa boolean rahisi jaribu kubadilisha uwongo kuwa kweli** na uone ikiwa unapata ufikiaji wowote.
|
|
|
|
## OAuth kwa Kuchukua Udhibiti wa Akaunti
|
|
|
|
{% content-ref url="oauth-to-account-takeover.md" %}
|
|
[oauth-to-account-takeover.md](oauth-to-account-takeover.md)
|
|
{% endcontent-ref %}
|
|
|
|
## Uingizaji wa Kichwa cha Mwenyeji
|
|
|
|
1. Kichwa cha Mwenyeji kinabadilishwa baada ya kuanzisha ombi la kurejesha nenosiri.
|
|
2. Kichwa cha mbele cha `X-Forwarded-For` kinabadilishwa kuwa `attacker.com`.
|
|
3. Kichwa cha Mwenyeji, Kumbukumbu, na Asili vinabadilishwa kwa wakati mmoja kuwa `attacker.com`.
|
|
4. Baada ya kuanzisha kurejesha nenosiri na kisha kuchagua kutuma tena barua pepe, njia zote tatu zilizotajwa hapo juu zinatumika.
|
|
|
|
## Udanganyifu wa Majibu
|
|
|
|
1. **Ubadilishaji wa Kanuni**: Kanuni ya hali inabadilishwa kuwa `200 OK`.
|
|
2. **Ubadilishaji wa Kanuni na Mwili**:
|
|
* Kanuni ya hali inabadilishwa kuwa `200 OK`.
|
|
* Mwili wa jibu unabadilishwa kuwa `{"mafanikio":kweli}` au kitu tupu `{}`.
|
|
|
|
Mbinu hizi za udanganyifu ni muhimu katika hali ambapo JSON hutumiwa kwa uhamishaji na upokeaji wa data.
|
|
|
|
## Badilisha barua pepe ya kikao cha sasa
|
|
|
|
Kutoka [ripoti hii](https://dynnyd20.medium.com/one-click-account-take-over-e500929656ea):
|
|
|
|
* Mshambuliaji anaomba kubadilisha barua pepe yake na mpya
|
|
* Mshambuliaji anapokea kiungo cha kuthibitisha mabadiliko ya barua pepe
|
|
* Mshambuliaji anamtumia muhanga kiungo ili aibonyeze
|
|
* Barua pepe ya muhanga inabadilishwa kuwa ile iliyoonyeshwa na mshambuliaji
|
|
* Shambulio linaweza kurejesha nenosiri na kuchukua udhibiti wa akaunti
|
|
|
|
## Marejeo
|
|
|
|
* [https://infosecwriteups.com/firing-8-account-takeover-methods-77e892099050](https://infosecwriteups.com/firing-8-account-takeover-methods-77e892099050)
|
|
* [https://dynnyd20.medium.com/one-click-account-take-over-e500929656ea](https://dynnyd20.medium.com/one-click-account-take-over-e500929656ea)
|
|
|
|
<details>
|
|
|
|
<summary><strong>Jifunze kuhusu kudukua AWS kutoka mwanzo hadi mtaalamu na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (Mtaalamu wa Timu Nyekundu ya HackTricks AWS)</strong></a><strong>!</strong></summary>
|
|
|
|
Njia nyingine za kusaidia HackTricks:
|
|
|
|
* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
|
|
* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
|
|
* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
|
|
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks\_live)**.**
|
|
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
|
|
|
|
</details>
|