Account Takeover

1. Chaining Session Hijacking with XSS

1.I have added a session hijacking method in broken authentication and session management. 
2.If you find that on target.
3.Try anyway to steal cookies on that target.
4.Here I am saying look for xss .
5.If you find xss you can steal the cookies of victim and using session hijacking you can takeover the account of victim.

2. No Rate Limit On Login With Weak Password Policy

So if you find that target have weak password policy, try to go for no rate limit attacks in poc shows by creating very weak password of your account.

(May or may not be accepted)

3. Password Reset Poisoning Leads To Token Theft

1.Go to password reset funtion.
2.Enter email and intercept the request.
3.Change host header to some other host i.e,
    Host:target.com
    Host:attacker.com
  also try to add some headers without changing host like
    X-Forwarded-Host: evil.com
    Referrer: https://evil.com
4. Forward this if you find that in next request attacker.com means you managed to successfully steal the token. :)

4. Password Reset using Forgot Password

5. Using Auth Bypass

6. Try For CSRF On

7. Token Leaks In Response

  • So there are multiple ways to do it but all are same.

  • So I will sharing my method that I have learnt here .

  • Endpoints:(Register,Forget Password)

  • Steps(For Registration):


  • Steps (For password reset):

8. Pre-Account Takeover

A pre-account takeover occurs when an attacker creates a user account using one signup method and the victim creates another account using a different signup method using the same email address. Because the email addresses are the same, the application connects the two accounts. when the app is unable to validate email addresses.

9. password reset

Reference:

Last updated