- Register account with mobile number and request for OTP.
- Enter incorrect OTP and capture the request in Burpsuite.
- Do intercept response to this request and forward the request.
- response will be
{"verificationStatus":false,"mobile":9072346577","profileId":"84673832"}
- Change this response to
{"verificationStatus":true,"mobile":9072346577","profileId":"84673832"}
- And forward the response.
- You will be logged in to the account.
Impact: Account Takeover
- Go to login and wait for OTP pop up.
- Enter incorrect OTP and capture the request in Burpsuite.
- Do intercept response to this request and forward the request.
- response will be
error
- Change this response to
success
- And forward the response.
- You will be logged in to the account.
Impact: Account Takeover
1.Register 2 accounts with any 2 mobile number(first enter right otp)
2.Intercept your request
3.click on action -> Do intercept -> intercept response to this request.
4.check what the message will display like status:1
5.Follow the same procedure with other account but this time enter wrong otp
6.Intercept respone to the request
7.See the message like you get status:0
8.Change status to 1 i.e, status:1 and forward the request if you logged in means you just done authentication bypass.
Steps :
1. Create an account with a non-existing phone number
2. Intercept the Request in BurpSuite
3. Send the request to the repeater and forward
4. Go to Repeater tab and change the non-existent phone number to your phone number
5. If you got an OTP to your phone, try using that OTP to register that non-existent number
- Steps:-
1) Create an Account
2) When Application Ask you For the OTP( One-time password ), Enter wrong OTP and Capture this Request In Burp.
3) Send This Request into Repeater and repeat it by setting up payload on otp Value.
4) if there is no Rate Limit then wait for 200 Status Code (Sometimes 302)
5)if you get 200 ok or 302 Found Status Code that means you've bypass OTP
1) Check for default OTP - 111111, 123456, 000000
2) Check if otp has been leaked in respone (Capture the request in burpsuite and send it to repeater to check the response)
3) Check if old OTP is still vaild
- 1 - Go to the URL : `https://abc.target.com/verify/phoneno`
- 2 - Enter random code (000000)
- 3 - `Intercept` the Request
- 4 - Send it to the `Intrude`r and add a payload position on `OTP parameter`
- 5 - Apply payload type as numbers, Set the range(000000-999999) and step as 1
- 6 - Start attack
- 7 The response length will change at correct OTP
- The attacker will be able to bypass the OTP which can lead to an Zero Account Takeover
- 1 - IP Based Blocking
- 2 - Captcha
- 3 - Firewall
- 4 - Reducing the number of API requests