mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 12:43:23 +00:00
76 lines
5.4 KiB
Markdown
76 lines
5.4 KiB
Markdown
# Bypass Payment Process
|
|
|
|
<details>
|
|
|
|
<summary><strong>htARTE (HackTricks AWS Red Team Expert)</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>qa'vIn AWS hacking jatlh</strong></a><strong>!</strong></summary>
|
|
|
|
HackTricks DaH jatlh:
|
|
|
|
* **HackTricks advertisement** vItlhutlh **company** pagh **HackTricks PDF download** qaStaHvIS yIlo' **SUBSCRIPTION PLANS** [**yIlo'**](https://github.com/sponsors/carlospolop)!
|
|
* [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) yIlo'
|
|
* [**The PEASS Family**](https://opensea.io/collection/the-peass-family) yIlo' **NFTs** [**collection**](https://opensea.io/collection/the-peass-family) DaH
|
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) **telegram group** [**yIlo'**](https://t.me/peass) **follow** **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
|
* **Share your hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) **HackTricks Cloud** [**github repos**](https://github.com/carlospolop/hacktricks-cloud).
|
|
|
|
</details>
|
|
|
|
<figure><img src="/.gitbook/assets/image (675).png" alt=""><figcaption></figcaption></figure>
|
|
|
|
Find vulnerabilities that matter most so you can fix them faster. Intruder tracks your attack surface, runs proactive threat scans, finds issues across your whole tech stack, from APIs to web apps and cloud systems. [**Try it for free**](https://www.intruder.io/?utm\_source=referral\&utm\_campaign=hacktricks) today.
|
|
|
|
{% embed url="https://www.intruder.io/?utm_campaign=hacktricks&utm_source=referral" %}
|
|
|
|
***
|
|
|
|
## Payment Bypass Techniques
|
|
|
|
### Request Interception
|
|
During the transaction process, it is crucial to monitor the data being exchanged between the client and the server. This can be done by intercepting all requests. Within these requests, look out for parameters with significant implications, such as:
|
|
|
|
- **Success**: This parameter often indicates the status of the transaction.
|
|
- **Referrer**: It might point to the source from where the request originated.
|
|
- **Callback**: This is typically used for redirecting the user after a transaction is completed.
|
|
|
|
### URL Analysis
|
|
If you encounter a parameter that contains a URL, especially one following the pattern _example.com/payment/MD5HASH_, it requires closer examination. Here's a step-by-step approach:
|
|
|
|
1. **Copy the URL**: Extract the URL from the parameter value.
|
|
2. **New Window Inspection**: Open the copied URL in a new browser window. This action is critical for understanding the transaction's outcome.
|
|
|
|
### Parameter Manipulation
|
|
1. **Change Parameter Values**: Experiment by altering the values of parameters like _Success_, _Referrer_, or _Callback_. For instance, changing a parameter from `false` to `true` can sometimes reveal how the system handles these inputs.
|
|
2. **Remove Parameters**: Try removing certain parameters altogether to see how the system reacts. Some systems might have fallbacks or default behaviors when expected parameters are missing.
|
|
|
|
### Cookie Tampering
|
|
1. **Examine Cookies**: Many websites store crucial information in cookies. Inspect these cookies for any data related to payment status or user authentication.
|
|
2. **Modify Cookie Values**: Alter the values stored in the cookies and observe how the website's response or behavior changes.
|
|
|
|
### Session Hijacking
|
|
1. **Session Tokens**: If session tokens are used in the payment process, try capturing and manipulating them. This might give insights into session management vulnerabilities.
|
|
|
|
### Response Tampering
|
|
1. **Intercept Responses**: Use tools to intercept and analyze the responses from the server. Look for any data that might indicate a successful transaction or reveal the next steps in the payment process.
|
|
2. **Modify Responses**: Attempt to modify the responses before they are processed by the browser or the application to simulate a successful transaction scenario.
|
|
|
|
|
|
<figure><img src="/.gitbook/assets/image (675).png" alt=""><figcaption></figcaption></figure>
|
|
|
|
Find vulnerabilities that matter most so you can fix them faster. Intruder tracks your attack surface, runs proactive threat scans, finds issues across your whole tech stack, from APIs to web apps and cloud systems. [**Try it for free**](https://www.intruder.io/?utm\_source=referral\&utm\_campaign=hacktricks) today.
|
|
|
|
{% embed url="https://www.intruder.io/?utm_campaign=hacktricks&utm_source=referral" %}
|
|
|
|
***
|
|
|
|
<details>
|
|
|
|
<summary><strong>htARTE (HackTricks AWS Red Team Expert)</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>qa'vIn AWS hacking jatlh</strong></a><strong>!</strong></summary>
|
|
|
|
HackTricks DaH jatlh:
|
|
|
|
* **HackTricks advertisement** vItlhutlh **company** pagh **HackTricks PDF download** qaStaHvIS yIlo' **SUBSCRIPTION PLANS** [**yIlo'**](https://github.com/sponsors/carlospolop)!
|
|
* [**official PEASS & HackTricks swag**](https://peass.creator-spring.com) yIlo'
|
|
* [**The PEASS Family**](https://opensea.io/collection/the-peass-family) yIlo' **NFTs** [**collection**](https://opensea.io/collection/the-peass-family) DaH
|
|
* **Join the** 💬 [**Discord group**](https://discord.gg/hRep4RUj7f) **telegram group** [**yIlo'**](https://t.me/peass) **follow** **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
|
|
* **Share your hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) **HackTricks Cloud** [**github repos**](https://github.com/carlospolop/hacktricks-cloud).
|
|
|
|
</details>
|