Skip to main content

Account Takeover Using Javascript(Js Win Always)

When we play with JavaScript, seriously we don’t need any tool only we have to understand the flow of JavaScript.  By Using JavaScript I bypassed the login in an application.

I am always excited to bypass things like login bypass, Otp Bypass etc. while I testing an application. I always check View-source of application mainly on login page and registration page
1.    Open application login page.  There are two ways of login in the application. One way by username and password and another one is mobile no and otp. I choose second one
2.       Let’s view source  of application login page :

ON seeing this code I noticed that  if otp is wrong then above function throw an error  otherwise loginwithmobile(mob No) function is called.



This function checks mobile no exist or not if mobile no exist then redirect to   admin/ home/index  ,  account is logined otherwise it throw an error.
Now try to bypass the response and login into any user account by  putting breakpoint in JavaScript.


 After implementing breakpoints, enter my no (for testing)  for login. Application asking   Otp for login . Now Enter any wrong otp (anything ) . and click on submit. Process     started .On hitting submit button it hit the breakpoints ,  In above screenshot , application  send Post request /matchotp having otp that we entered and  waiting for response. If response is success then loginwithmobileno function is called otherwise error thrown.
We know already that otp  is wrong  so response success  will never come.

I see that In response “Invalid Otp”  showing ? just simply thought I can bypass the verification by just changing  “invalid otp” to “success”. 😋
I just change Response “invalid otp” to “success”


     And resume the application, Boom 😇, application login is bypassed



Comments

Anonymous said…
keep it up bro, work hard ..learn hard
Unknown said…
Today we will Discuss One interesting Topic OTP (One time password) Bypass ! How hackers able to Bypass OTP bypass On Web Or Mobile based application.

Popular posts from this blog

Passcode Protection Bypass By Brute Forcing On zoho (Cliq Application)

First We discuss about what is passcode and Why it is Implemented in  Mobile Applications. PASSCODE Implemented in Mobile Application to protect Applications from an Unauthorized Access.like for example your cliq or any application account is logged in mobile phone .any your friend ask you to give phone , your friend try to open cliq application to see your message, but your friend cant open the application without entering passcode . he have to enter passcode for open, so it is an extra layer security in  applications. Passcode protection implemented in Android Application is an extra layer security to protect an unauthorized access. How Passcode Protection is bypassed by Bruteforcing? You know that passcode protection or pin protection in mobile applications have some attempt to enter passcode , if you enter  wrong passcode more than 5 times or 10 times based on application security , User logged out automatically and redirected to login page.but due to some ...

Exploitation of Improper Export of Activities In Android Application

In android You know that every GUI interface is an  separate activity. An activity represents a single screen with a user interface just like window or frame of Java. In An application there are many activities depend on application functionalities. Let's take a example : An application that have   three modules login , register and   dashboard . For that there are there are three different activities for all these modules. What is export Means Here? In Android Application there is an attribute android: exported =true or false . This attribute is used in android   to provide an access to   other third party application to start their service , activities   and receive broadcast   messages. Like for an Example : If an application    have broadcast receiver to receive any events or message , if in that application exported attribute is set to true then this    broadcast message   can also receive by other thi...

A New Way Of Brute force Passcode/Pin Protection By deep link

DESCRIPTION : AS you know already that what is passcode protection and why it is applied ? And how it is bypassed normally ? If you don’t know please read my previous blog:   https://negativewives.blogspot.com/2020/04/passcode-protection-bypass-by-brute.html                                                                                When any passcode protection is implemented first check any activity is exported or not ? Here we  only talking the scenario where no activity is exported in application   PROCEDURE : Open Application after implementing passcode protection. You see that passcode activity is launched first Go to AndroidMainfest.xml file and check launch mode of passcode activity . Question Arises in your mind   - ...