Skip to main content

OTP Bypassing :

 Bypass OTP Schema:-

→ Response mnipulate

→ Bruteforce

→ Sms forwarding

→ Broken authentication we can use any random value



Here, We will discuss about How attacker able to bypass OTP Schema by response manipulate technique . If You don’t know What is response manipulate is a technique attacker try to analyze Request using some proxy tool attacker can change value of Response without entering correct OTP.

Steps Of Testing:

1. Here We have a vulnerable Application which allow us to Bypass OTP Schema That consist broken authentication schema.

As when We login Or Sign up as authenticate some application ask for OTP Confirmation,




As above picture when user enter OTP Confirmation Code which comes to User Email After entering OTP we can access as Authenticate user ,

2. Here For checking Is application is vulnerable for OTP Bypass we will use some random OTP 0000 Value




As above picture we Entered wrong OTP Value ,

Now, here we have to do before Click Verifiy Open Some proxy tool to intercept Request here we will use Burp which help us to intercept request and We can change Response .

3. click verify Confirmation OTP with Random Value and Intercept Request using Burp




As above picture We have captured request As POST request code=0000 with Random Value , here to check or edit response Right Click Your Mouse → Do intercept → Response to this Host


Now, As Response :



As above picture As result 400 bad Request that mean we have entered Wrong OTP value ,

Now, The main point is come here Now we we bypass this 400 bad request by Response mnipulate here simply We need to make change On response section ,




Now, as above picture we change value 400 bad request → 200 OK and, “err”:no more attempts allowed”,”ECODE”:”usr_069”}( Note: Different web You will get different Response Technique is same) as error response We change value as { }

Now , Forward this Response and as result we have successfully bypass authentication schema due to broken authentication schema.

We will be seeing other methods for bypassing SMS in upcoming blogs✨

Comments

Popular posts from this blog

How to Record Whatsapp calls.

  H owever, different third-party apps can be used to record WhatsApp voice calls.   However, what it does not allow is to record voice calls.  Here, we will tell you the best possible way to record WhatsApp voice calls on your Android and iOS device. WhatsApp doesn't have an option to record voice calls Users can only record voice calls using a third-party app.  How to record WhatsApp voice calls on Android Application Call Recorder: Cube ACR allows you to seamlessly record voice calls over WhatsApp.  Here’s how you can record WhatsApp calls in simple steps.  WhatsApp is becoming a one-stop for all the messaging needs, be it sharing files or having group chats or video calls.  WhatsApp is one of the most popular and downloaded applications not just for messaging but for video and voice calling.  So let’s get started. Open Google Play Store and search the Cube Call application. Once installed open the Cube Call application and then switch to Wh...

Acessing webcam(Phishing)

  Web-Cam Cam-phish is techniques to take cam shots of target’s phone or pc. It is a phishing tool which hosts fake websites on in built PHP server and uses ngrok server to generate a link which we will forward to the target, which can be used on over internet. Website asks for camera permission and if target allows it, this tool grab cam shots of target’s device. Requirements:- apt -get -y install php openssh git wget Installation :- git clone https://github.com/techchipnet/CamPhish cd CamPhish bash camphish.sh Cam-Phish is created to help in penetration testing and it's not responsible for any misuse or illegal purposes. Cam-Phish is inspired by  https://github.com/thelinuxchoice/  Big thanks !!!

Best WiFi Adapter for Kali Linux

1. Alfa AWUS036NH  We are using this WiFi adapter from the BackTrack days (before releasing Kali Linux) and still we consider it as one of the best. For it’s long range signals we can do our penetration testing jobs from a long distance. Alfa AWUS036NHA Kali Linux WiFi Adapter 2020 Alfa AWUS036NH is plug and play and compatible with any brand 802.11g or 802.11n router using 2.4 GHz wavelength and supports multi-stream & MIMO (multiple input multiple output) with high speed transfer TX data rate up to 150 MBPS. It also comes with a clip which can be used to attach this adapter on a laptop lid. Chipset: Atheros AR 9271. Compatible with any brand 802.11b, 802.11g or 802.11n router using 2.4 Ghz wave-length. Includes a 5 dBi omni directional antenna as well as a 7 dbi panel antenna. Supports security protocols: 64/128-bit WEP, WPA, WPA2, TKIP, AES. Compatible with Kali Linux RPi with monitor mode and packet injection. High transmitter power of 28 dBm – for long-rang and high gain W...