mirror of
https://github.com/HackTricks-wiki/hacktricks.git
synced 2025-10-10 18:36:50 +00:00
Translated ['src/pentesting-web/account-takeover.md'] to sw
This commit is contained in:
parent
f0c60ddd53
commit
6468582299
@ -842,7 +842,6 @@
|
|||||||
- [FISSURE - The RF Framework](todo/radio-hacking/fissure-the-rf-framework.md)
|
- [FISSURE - The RF Framework](todo/radio-hacking/fissure-the-rf-framework.md)
|
||||||
- [Low-Power Wide Area Network](todo/radio-hacking/low-power-wide-area-network.md)
|
- [Low-Power Wide Area Network](todo/radio-hacking/low-power-wide-area-network.md)
|
||||||
- [Pentesting BLE - Bluetooth Low Energy](todo/radio-hacking/pentesting-ble-bluetooth-low-energy.md)
|
- [Pentesting BLE - Bluetooth Low Energy](todo/radio-hacking/pentesting-ble-bluetooth-low-energy.md)
|
||||||
- [Industrial Control Systems Hacking](todo/industrial-control-systems-hacking/README.md)
|
|
||||||
- [Test LLMs](todo/test-llms.md)
|
- [Test LLMs](todo/test-llms.md)
|
||||||
- [LLM Training](todo/llm-training-data-preparation/README.md)
|
- [LLM Training](todo/llm-training-data-preparation/README.md)
|
||||||
- [0. Basic LLM Concepts](todo/llm-training-data-preparation/0.-basic-llm-concepts.md)
|
- [0. Basic LLM Concepts](todo/llm-training-data-preparation/0.-basic-llm-concepts.md)
|
||||||
|
@ -12,12 +12,12 @@ Barua pepe ya akaunti inapaswa kujaribiwa kubadilishwa, na mchakato wa uthibitis
|
|||||||
2. Akaunti inapaswa kuundwa kwa kutumia Unicode\
|
2. Akaunti inapaswa kuundwa kwa kutumia Unicode\
|
||||||
kwa mfano: `vićtim@gmail.com`
|
kwa mfano: `vićtim@gmail.com`
|
||||||
|
|
||||||
Kama ilivyoelezwa katika [**hii hotuba**](https://www.youtube.com/watch?v=CiIyaZ3x49c), shambulio la awali linaweza pia kufanywa kwa kutumia watoa huduma wa utambulisho wa upande wa tatu:
|
Kama ilivyoelezwa katika [**hili mazungumzo**](https://www.youtube.com/watch?v=CiIyaZ3x49c), shambulio la awali linaweza pia kufanywa kwa kutumia watoa huduma za utambulisho wa upande wa tatu:
|
||||||
|
|
||||||
- Unda akaunti katika utambulisho wa upande wa tatu kwa barua pepe inayofanana na ya mwathirika kwa kutumia herufi za unicode (`vićtim@company.com`).
|
- Unda akaunti katika utambulisho wa upande wa tatu kwa barua pepe inayofanana na ya mwathirika kwa kutumia herufi za unicode (`vićtim@company.com`).
|
||||||
- Mtoa huduma wa upande wa tatu hapaswi kuthibitisha barua pepe
|
- Mtoa huduma wa upande wa tatu haipaswi kuthibitisha barua pepe
|
||||||
- Ikiwa mtoa huduma wa utambulisho anathibitisha barua pepe, labda unaweza kushambulia sehemu ya domain kama: `victim@ćompany.com` na kujiandikisha kwa hiyo domain na kutumaini kwamba mtoa huduma wa utambulisho anaunda toleo la ascii la domain wakati jukwaa la mwathirika linanormalize jina la domain.
|
- Ikiwa mtoa huduma wa utambulisho anathibitisha barua pepe, labda unaweza kushambulia sehemu ya domain kama: `victim@ćompany.com` na kujiandikisha kwa hiyo domain na kutumaini kwamba mtoa huduma wa utambulisho anaunda toleo la ascii la domain wakati jukwaa la mwathirika linanormalize jina la domain.
|
||||||
- Ingia kupitia mtoa huduma huyu wa utambulisho katika jukwaa la mwathirika ambaye anapaswa kunormalize herufi za unicode na kukuruhusu ufikie akaunti ya mwathirika.
|
- Ingia kupitia mtoa huduma huyu wa utambulisho katika jukwaa la mwathirika ambaye anapaswa ku-normalize herufi za unicode na kukuruhusu ufikie akaunti ya mwathirika.
|
||||||
|
|
||||||
Kwa maelezo zaidi, rejelea hati kuhusu Unicode Normalization:
|
Kwa maelezo zaidi, rejelea hati kuhusu Unicode Normalization:
|
||||||
|
|
||||||
@ -37,7 +37,7 @@ Ikiwa mfumo wa lengo unaruhusu **kiungo cha kurekebisha kutumika tena**, juhudi
|
|||||||
|
|
||||||
## **CORS Misconfiguration to Account Takeover**
|
## **CORS Misconfiguration to Account Takeover**
|
||||||
|
|
||||||
Ikiwa ukurasa una **CORS misconfigurations** unaweza kuwa na uwezo wa **kuiba taarifa nyeti** kutoka kwa mtumiaji ili **kuchukua akaunti yake** au kumfanya abadilishe taarifa za uthibitisho kwa lengo hilo:
|
Ikiwa ukurasa una **CORS misconfigurations** unaweza kuwa na uwezo wa **kuiba taarifa nyeti** kutoka kwa mtumiaji ili **kuchukua akaunti yake** au kumfanya abadilishe taarifa za uthibitisho kwa kusudi hilo:
|
||||||
|
|
||||||
{{#ref}}
|
{{#ref}}
|
||||||
cors-bypass.md
|
cors-bypass.md
|
||||||
@ -45,7 +45,7 @@ cors-bypass.md
|
|||||||
|
|
||||||
## **Csrf to Account Takeover**
|
## **Csrf to Account Takeover**
|
||||||
|
|
||||||
Ikiwa ukurasa unahatarishwa kwa CSRF unaweza kuwa na uwezo wa kumfanya **mtumiaji abadilishe nenosiri lake**, barua pepe au uthibitisho ili uweze kisha kuifikia:
|
Ikiwa ukurasa unahatarishwa na CSRF unaweza kuwa na uwezo wa kumfanya **mtumiaji abadilishe nenosiri lake**, barua pepe au uthibitisho ili uweze kufikia hiyo:
|
||||||
|
|
||||||
{{#ref}}
|
{{#ref}}
|
||||||
csrf-cross-site-request-forgery.md
|
csrf-cross-site-request-forgery.md
|
||||||
@ -53,7 +53,7 @@ csrf-cross-site-request-forgery.md
|
|||||||
|
|
||||||
## **XSS to Account Takeover**
|
## **XSS to Account Takeover**
|
||||||
|
|
||||||
Ikiwa unapata XSS katika programu unaweza kuwa na uwezo wa kuiba vidakuzi, uhifadhi wa ndani, au taarifa kutoka kwenye ukurasa wa wavuti ambayo inaweza kukuruhusu kuchukua akaunti:
|
Ikiwa unapata XSS katika programu unaweza kuwa na uwezo wa kuiba vidakuzi, hifadhi ya ndani, au taarifa kutoka kwenye ukurasa wa wavuti ambayo inaweza kukuruhusu kuchukua akaunti:
|
||||||
|
|
||||||
{{#ref}}
|
{{#ref}}
|
||||||
xss-cross-site-scripting/
|
xss-cross-site-scripting/
|
||||||
@ -61,7 +61,7 @@ xss-cross-site-scripting/
|
|||||||
|
|
||||||
## **Same Origin + Cookies**
|
## **Same Origin + Cookies**
|
||||||
|
|
||||||
Ikiwa unapata XSS iliyopunguzwa au kuchukua subdomain, unaweza kucheza na vidakuzi (kuvifunga kwa mfano) ili kujaribu kuathiri akaunti ya mwathirika:
|
Ikiwa unapata XSS iliyopunguzwa au kuchukua subdomain, unaweza kucheza na vidakuzi (kuvifunga kwa mfano) kujaribu kuathiri akaunti ya mwathirika:
|
||||||
|
|
||||||
{{#ref}}
|
{{#ref}}
|
||||||
hacking-with-cookies/
|
hacking-with-cookies/
|
||||||
@ -75,7 +75,7 @@ reset-password.md
|
|||||||
|
|
||||||
## **Response Manipulation**
|
## **Response Manipulation**
|
||||||
|
|
||||||
Ikiwa jibu la uthibitisho linaweza **kupunguzwa kuwa boolean rahisi jaribu kubadilisha false kuwa true** na uone kama unapata ufikiaji wowote.
|
Ikiwa jibu la uthibitisho linaweza **kupunguzwa kuwa boolean rahisi jaribu kubadilisha false kuwa true** na uone ikiwa unapata ufikiaji wowote.
|
||||||
|
|
||||||
## OAuth to Account takeover
|
## OAuth to Account takeover
|
||||||
|
|
||||||
@ -86,18 +86,18 @@ oauth-to-account-takeover.md
|
|||||||
## Host Header Injection
|
## Host Header Injection
|
||||||
|
|
||||||
1. Header ya Host inabadilishwa kufuatia kuanzishwa kwa ombi la kurekebisha nenosiri.
|
1. Header ya Host inabadilishwa kufuatia kuanzishwa kwa ombi la kurekebisha nenosiri.
|
||||||
2. Header ya `X-Forwarded-For` inabadilishwa kuwa `attacker.com`.
|
2. Header ya proxy `X-Forwarded-For` inabadilishwa kuwa `attacker.com`.
|
||||||
3. Headers za Host, Referrer, na Origin zinabadilishwa kwa wakati mmoja kuwa `attacker.com`.
|
3. Headers za Host, Referrer, na Origin zinabadilishwa kwa wakati mmoja kuwa `attacker.com`.
|
||||||
4. Baada ya kuanzisha kurekebisha nenosiri na kisha kuchagua kutuma tena barua, mbinu zote tatu zilizotajwa hapo juu zinatumika.
|
4. Baada ya kuanzisha kurekebisha nenosiri na kisha kuchagua kutuma tena barua, mbinu zote tatu zilizotajwa hapo juu zinatumika.
|
||||||
|
|
||||||
## Response Manipulation
|
## Response Manipulation
|
||||||
|
|
||||||
1. **Code Manipulation**: Kiwango cha hali kinabadilishwa kuwa `200 OK`.
|
1. **Code Manipulation**: Nambari ya hali inabadilishwa kuwa `200 OK`.
|
||||||
2. **Code and Body Manipulation**:
|
2. **Code and Body Manipulation**:
|
||||||
- Kiwango cha hali kinabadilishwa kuwa `200 OK`.
|
- Nambari ya hali inabadilishwa kuwa `200 OK`.
|
||||||
- Mwili wa jibu unabadilishwa kuwa `{"success":true}` au kitu kisichokuwa na kitu `{}`.
|
- Mwili wa jibu unabadilishwa kuwa `{"success":true}` au kitu kisichokuwa na kitu `{}`.
|
||||||
|
|
||||||
Mbinu hizi za urekebishaji zinafaa katika hali ambapo JSON inatumika kwa usafirishaji na kupokea data.
|
Mbinu hizi za urekebishaji ni bora katika hali ambapo JSON inatumika kwa usafirishaji na kupokea data.
|
||||||
|
|
||||||
## Change email of current session
|
## Change email of current session
|
||||||
|
|
||||||
@ -111,10 +111,15 @@ Kutoka [ripoti hii](https://dynnyd20.medium.com/one-click-account-take-over-e500
|
|||||||
|
|
||||||
Hii pia ilitokea katika [**ripoti hii**](https://dynnyd20.medium.com/one-click-account-take-over-e500929656ea).
|
Hii pia ilitokea katika [**ripoti hii**](https://dynnyd20.medium.com/one-click-account-take-over-e500929656ea).
|
||||||
|
|
||||||
|
### Bypass email verification for Account Takeover
|
||||||
|
- Mshambuliaji anaingia na attacker@test.com na kuthibitisha barua pepe wakati wa kujiandikisha.
|
||||||
|
- Mshambuliaji anabadilisha barua pepe iliyothibitishwa kuwa victim@test.com (hakuna uthibitisho wa pili kwenye mabadiliko ya barua pepe)
|
||||||
|
- Sasa tovuti inaruhusu victim@test.com kuingia na tumepita uthibitisho wa barua pepe wa mtumiaji mwathirika.
|
||||||
|
|
||||||
### Old Cookies
|
### Old Cookies
|
||||||
|
|
||||||
Kama ilivyoelezwa [**katika chapisho hili**](https://medium.com/@niraj1mahajan/uncovering-the-hidden-vulnerability-how-i-found-an-authentication-bypass-on-shopifys-exchange-cc2729ea31a9), ilikuwa inawezekana kuingia kwenye akaunti, kuhifadhi vidakuzi kama mtumiaji aliyeidhinishwa, kutoka, na kisha kuingia tena.\
|
Kama ilivyoelezwa [**katika chapisho hili**](https://medium.com/@niraj1mahajan/uncovering-the-hidden-vulnerability-how-i-found-an-authentication-bypass-on-shopifys-exchange-cc2729ea31a9), ilikuwa inawezekana kuingia kwenye akaunti, kuhifadhi vidakuzi kama mtumiaji aliyethibitishwa, kutoka, na kisha kuingia tena.\
|
||||||
Kwa kuingia mpya, ingawa vidakuzi tofauti vinaweza kuundwa vidakuzi vya zamani vilianza kufanya kazi tena.
|
Kwa kuingia mpya, ingawa vidakuzi tofauti vinaweza kuundwa, vya zamani vilianza kufanya kazi tena.
|
||||||
|
|
||||||
## References
|
## References
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user