UNDERCODE TESTING
2025_ceh_notes.pdf
๐ฆEssential Study Notes for CEH (Certified Ethical Hacker) Certification ๐
The Certified Ethical Hacker (CEH) certification is a benchmark for anyone looking to excel in ethical hacking and cybersecurity. To help you on your journey, hereโs a detailed overview of what youโll learn with these CEH study notes:
๐ Key Topics Covered:
1๏ธโฃ Footprinting and Reconnaissance: Learn how attackers gather information about a target system and how to counteract it.
2๏ธโฃ Scanning Networks: Understand the tools and techniques used to identify vulnerabilities in networks.
3๏ธโฃ Gaining Access: Dive into methods attackers use to exploit vulnerabilities and how to mitigate them.
4๏ธโฃ Maintaining Access: Discover how attackers establish backdoors and how to detect and eliminate them.
5๏ธโฃ Covering Tracks: Learn methods used by attackers to hide their activity and how to uncover these traces.
6๏ธโฃ Malware Threats: Get insights into Trojans, viruses, worms, and other forms of malware.
7๏ธโฃ Social Engineering: Explore techniques used to exploit human vulnerabilities and how to safeguard against them.
8๏ธโฃ Web Application Security: Understand how web applications are exploited and the measures needed to secure them.
9๏ธโฃ Wireless Network Security: Learn about Wi-Fi vulnerabilities and secure configurations.
๐ Tools & Frameworks: Master the use of tools like Metasploit, Nmap, Burp Suite, and more.
๐ง Why CEH Notes are Important:
โข Concise and Exam-Focused: Designed to help you grasp key concepts quickly.
โข Real-World Relevance: Learn tactics used by ethical hackers in real scenarios.
โข Practical Guidance: Tips for applying concepts to real-life cybersecurity challenges.
๐ Benefits of Studying CEH:
โข Build foundational skills in penetration testing.
โข Enhance your understanding of cybersecurity defense strategies.
โข Gain recognition in the industry with a globally respected certification.
Ref: in pdf
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
The Certified Ethical Hacker (CEH) certification is a benchmark for anyone looking to excel in ethical hacking and cybersecurity. To help you on your journey, hereโs a detailed overview of what youโll learn with these CEH study notes:
๐ Key Topics Covered:
1๏ธโฃ Footprinting and Reconnaissance: Learn how attackers gather information about a target system and how to counteract it.
2๏ธโฃ Scanning Networks: Understand the tools and techniques used to identify vulnerabilities in networks.
3๏ธโฃ Gaining Access: Dive into methods attackers use to exploit vulnerabilities and how to mitigate them.
4๏ธโฃ Maintaining Access: Discover how attackers establish backdoors and how to detect and eliminate them.
5๏ธโฃ Covering Tracks: Learn methods used by attackers to hide their activity and how to uncover these traces.
6๏ธโฃ Malware Threats: Get insights into Trojans, viruses, worms, and other forms of malware.
7๏ธโฃ Social Engineering: Explore techniques used to exploit human vulnerabilities and how to safeguard against them.
8๏ธโฃ Web Application Security: Understand how web applications are exploited and the measures needed to secure them.
9๏ธโฃ Wireless Network Security: Learn about Wi-Fi vulnerabilities and secure configurations.
๐ Tools & Frameworks: Master the use of tools like Metasploit, Nmap, Burp Suite, and more.
๐ง Why CEH Notes are Important:
โข Concise and Exam-Focused: Designed to help you grasp key concepts quickly.
โข Real-World Relevance: Learn tactics used by ethical hackers in real scenarios.
โข Practical Guidance: Tips for applying concepts to real-life cybersecurity challenges.
๐ Benefits of Studying CEH:
โข Build foundational skills in penetration testing.
โข Enhance your understanding of cybersecurity defense strategies.
โข Gain recognition in the industry with a globally respected certification.
Ref: in pdf
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ These Microsoft Labs are an excellent way to deepen your knowledge and boost your exam readiness!
๐น Enroll for the Azure Administrator AZ-104 Practice Test with Labs
๐งช https://lnkd.in/dJcSggXB
๐น Course AZ-104T00
๐น 96-Hour Course
๐งช Course Link: https://lnkd.in/ds32UBjW
๐น Practice Test with Labs
๐งช https://lnkd.in/dtPYNDef
๐น Manage Azure Entra ID Identities
๐งช https://lnkd.in/diDaDxjX
๐น Manage Subscriptions and RBAC
๐งช https://lnkd.in/dmuqpxUJ
๐น Manage Governance via Azure Policy
๐งช https://lnkd.in/di3iBw6h
๐น Manage Azure Resources by using the Azure Portal
๐งช https://lnkd.in/d9V2h2xd
๐น Manage Azure resources by using Azure Resource Manage Templates
๐งช https://lnkd.in/dGnVX6dM
๐น Manage Azure Resources by using Azure PowerShell
๐งช https://lnkd.in/dGS_V9St
๐น Manage Azure resources by using the Azure CLI
๐งช https://lnkd.in/dqvrkGhY
๐น Implement Virtual networking
๐งช https://lnkd.in/d6yejKdB
๐น Implement inter site Connectivity
๐งช https://lnkd.in/dCGARJFp
๐น Implement Traffic management
๐งช https://lnkd.in/dWJDZ4HD
๐น Manage Azure Storage
๐งช https://lnkd.in/dbmGjkTi
Ref: Anuradha Samaranayake
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐น Enroll for the Azure Administrator AZ-104 Practice Test with Labs
๐งช https://lnkd.in/dJcSggXB
๐น Course AZ-104T00
๐น 96-Hour Course
๐งช Course Link: https://lnkd.in/ds32UBjW
๐น Practice Test with Labs
๐งช https://lnkd.in/dtPYNDef
๐น Manage Azure Entra ID Identities
๐งช https://lnkd.in/diDaDxjX
๐น Manage Subscriptions and RBAC
๐งช https://lnkd.in/dmuqpxUJ
๐น Manage Governance via Azure Policy
๐งช https://lnkd.in/di3iBw6h
๐น Manage Azure Resources by using the Azure Portal
๐งช https://lnkd.in/d9V2h2xd
๐น Manage Azure resources by using Azure Resource Manage Templates
๐งช https://lnkd.in/dGnVX6dM
๐น Manage Azure Resources by using Azure PowerShell
๐งช https://lnkd.in/dGS_V9St
๐น Manage Azure resources by using the Azure CLI
๐งช https://lnkd.in/dqvrkGhY
๐น Implement Virtual networking
๐งช https://lnkd.in/d6yejKdB
๐น Implement inter site Connectivity
๐งช https://lnkd.in/dCGARJFp
๐น Implement Traffic management
๐งช https://lnkd.in/dWJDZ4HD
๐น Manage Azure Storage
๐งช https://lnkd.in/dbmGjkTi
Ref: Anuradha Samaranayake
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
๐ฆThievingFox - Remotely retrieving credentials from password managers and Windows utilities:
https://lnkd.in/dfXhpv_D
https://lnkd.in/dfXhpv_D
UNDERCODE TESTING
GIF
๐ฆOne of the visualization tools that can help in detecting anomalies in large amounts of data that you may not know!
If you are in the cybersecurity field, you know the importance of analyzing large volumes of log data.. ๐ฎโ๐จ
This tool is an open-source visualization software designed to interactively explore and understand massive amounts of tabular data!
๐๐ช๐ฎ๐๐ฒ
๐นIt gives users an detailed yet intuitive multi-view representation of column-oriented data and can ingest from:
- Structured text files (CSV, logs, ...)
- Apache Parquet files
- Pcap files
- SQL databases
- Elasticsearch databases
๐น It delivers value through its VISU approach:
- Visualize: Leverage various visual representations of raw data in combination with statistics.
- Investigate: Use filters to build an accurate understanding of millions of rows while switching instantly between capturing the big picture and focusing on the details.
- Spot the Unknown: As a structured understanding of the data emerges, identify unknowns and anomalies.
๐น It can be used for many different purposes, such as:
Cybersecurity (to detect attacks and data leaks), BI and Big Data, IT troubleshooting, and Machine Learning.
๐ To download: squey[.]org/download/
๐ Documentation: doc[.]squey[.]org
๐ด If you want my advice, I would recommend installing it and solve a network forensics (PCAP file) challenge, to have an idea about it first ๐
๐ดNote: To install it on Windows, you need to have installed and enabled WSL2.
Ref: Shbib
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
If you are in the cybersecurity field, you know the importance of analyzing large volumes of log data.. ๐ฎโ๐จ
This tool is an open-source visualization software designed to interactively explore and understand massive amounts of tabular data!
๐๐ช๐ฎ๐๐ฒ
๐นIt gives users an detailed yet intuitive multi-view representation of column-oriented data and can ingest from:
- Structured text files (CSV, logs, ...)
- Apache Parquet files
- Pcap files
- SQL databases
- Elasticsearch databases
๐น It delivers value through its VISU approach:
- Visualize: Leverage various visual representations of raw data in combination with statistics.
- Investigate: Use filters to build an accurate understanding of millions of rows while switching instantly between capturing the big picture and focusing on the details.
- Spot the Unknown: As a structured understanding of the data emerges, identify unknowns and anomalies.
๐น It can be used for many different purposes, such as:
Cybersecurity (to detect attacks and data leaks), BI and Big Data, IT troubleshooting, and Machine Learning.
๐ To download: squey[.]org/download/
๐ Documentation: doc[.]squey[.]org
๐ด If you want my advice, I would recommend installing it and solve a network forensics (PCAP file) challenge, to have an idea about it first ๐
๐ดNote: To install it on Windows, you need to have installed and enabled WSL2.
Ref: Shbib
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2025 FREE Certification Courses!
No Fee, No Subscription, No Registration Required, Just Start Learning.
These Courses Includes Video Lectures, Tutorial and Easy Notes.
All courses are from the Microsoft Learn platform.
Microsoft Learn
.
1-Microsoft Azure Administrator
- Course AZ-104T00
- Course Link: https://lnkd.in/dUEGRTgq
2-Configuring and Operating Microsoft Azure Virtual Desktop
- Course AZ-140
- Course Link: https://lnkd.in/dWCUPjTC
3-Designing Microsoft Azure Infrastructure Solutions
- Course AZ-305T00
- Course Link: https://lnkd.in/dmvHyJ_z
4-Developing Solutions for Microsoft Azure
- Course AZ-204T00
- Course Link:https://lnkd.in/dtfBZBN6
5-Designing and Implementing Microsoft DevOps solutions
- Course AZ-400T00
- Course Link:https://lnkd.in/drCiHKgM
6-Designing and Implementing a Microsoft Azure AI Solution
- Course AI-102T00
- Course Link: https://lnkd.in/ducvr87J
7-Develop Generative AI Solutions with Azure OpenAI Service
- Course AI-050T00
- Course Link: https://lnkd.in/dJFW_PgR
8- Microsoft Security, Compliance, and Identity Fundamentals
- Course SC-900T00
- Course Link: https://lnkd.in/dRgx4EKG
9- Data Engineering on Microsoft Azure
- Course DP-203T00
- Course Link: https://lnkd.in/dSU6QmgT
10-Microsoft Security Operations Analyst
- Course SC-200T00
- Course Link: https://lnkd.in/d2EYRJph
11- Designing and Implementing Microsoft Azure Networking Solutions
- Course AZ-700T00
- Course Link: https://lnkd.in/dhDBjPaK
12-Designing and implementing a data science solution on Azure
- Course DP-100T01
- Course Link: https://lnkd.in/dUsB4GS6
13-Administering Microsoft Azure SQL Solutions
- Course DP-300T00
- Course Link:https://lnkd.in/d-5CzTDz
14-Microsoft Cybersecurity Architect
- Course SC-100T00
- Course Link: https://lnkd.in/dRhNSNsQ
15-Microsoft Azure Security Technologies
- Course AZ-500T00
- Course Link:https://lnkd.in/dPARyEZB
16-Azure Support Engineer Troubleshooting Azure Connectivity
- Course AZ-720T00
- Course Link: https://lnkd.in/d87-6RmC
17-Administering Windows Server Hybrid Core Infrastructure
- Course AZ-800T00
- Course Link:https://lnkd.in/dimC-puE
18-Configuring Windows Server Hybrid Advanced Services
- Course AZ-801T00
-Course Link:https://lnkd.in/dmXNAtP5
Ref: Shahzad MS
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
No Fee, No Subscription, No Registration Required, Just Start Learning.
These Courses Includes Video Lectures, Tutorial and Easy Notes.
All courses are from the Microsoft Learn platform.
Microsoft Learn
.
1-Microsoft Azure Administrator
- Course AZ-104T00
- Course Link: https://lnkd.in/dUEGRTgq
2-Configuring and Operating Microsoft Azure Virtual Desktop
- Course AZ-140
- Course Link: https://lnkd.in/dWCUPjTC
3-Designing Microsoft Azure Infrastructure Solutions
- Course AZ-305T00
- Course Link: https://lnkd.in/dmvHyJ_z
4-Developing Solutions for Microsoft Azure
- Course AZ-204T00
- Course Link:https://lnkd.in/dtfBZBN6
5-Designing and Implementing Microsoft DevOps solutions
- Course AZ-400T00
- Course Link:https://lnkd.in/drCiHKgM
6-Designing and Implementing a Microsoft Azure AI Solution
- Course AI-102T00
- Course Link: https://lnkd.in/ducvr87J
7-Develop Generative AI Solutions with Azure OpenAI Service
- Course AI-050T00
- Course Link: https://lnkd.in/dJFW_PgR
8- Microsoft Security, Compliance, and Identity Fundamentals
- Course SC-900T00
- Course Link: https://lnkd.in/dRgx4EKG
9- Data Engineering on Microsoft Azure
- Course DP-203T00
- Course Link: https://lnkd.in/dSU6QmgT
10-Microsoft Security Operations Analyst
- Course SC-200T00
- Course Link: https://lnkd.in/d2EYRJph
11- Designing and Implementing Microsoft Azure Networking Solutions
- Course AZ-700T00
- Course Link: https://lnkd.in/dhDBjPaK
12-Designing and implementing a data science solution on Azure
- Course DP-100T01
- Course Link: https://lnkd.in/dUsB4GS6
13-Administering Microsoft Azure SQL Solutions
- Course DP-300T00
- Course Link:https://lnkd.in/d-5CzTDz
14-Microsoft Cybersecurity Architect
- Course SC-100T00
- Course Link: https://lnkd.in/dRhNSNsQ
15-Microsoft Azure Security Technologies
- Course AZ-500T00
- Course Link:https://lnkd.in/dPARyEZB
16-Azure Support Engineer Troubleshooting Azure Connectivity
- Course AZ-720T00
- Course Link: https://lnkd.in/d87-6RmC
17-Administering Windows Server Hybrid Core Infrastructure
- Course AZ-800T00
- Course Link:https://lnkd.in/dimC-puE
18-Configuring Windows Server Hybrid Advanced Services
- Course AZ-801T00
-Course Link:https://lnkd.in/dmXNAtP5
Ref: Shahzad MS
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Media is too big
VIEW IN TELEGRAM
๐ฆ Bypassing CrowdStrike EDR with Hookchain and Custom Shellcode ๐จ
๐ Key Points:
- Utilizing the Hookchain technique for evasion of detection.
- Designing custom shellcode for discreet execution.
- Illustrating the necessity for robust detection methods surpassing traditional EDR capabilities.
This experiment sheds light on critical vulnerabilities that sophisticated attackers could exploit, emphasizing the significance of embracing multi-layered security approaches.
๐ก๏ธ Disclaimer: This exploration serves solely for educational purposes, aiming to deepen comprehension of EDR bypass strategies for enhanced defense mechanisms. The primary objective? Strengthening cybersecurity infrastructures.
Ref: Ammar. A
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ Key Points:
- Utilizing the Hookchain technique for evasion of detection.
- Designing custom shellcode for discreet execution.
- Illustrating the necessity for robust detection methods surpassing traditional EDR capabilities.
This experiment sheds light on critical vulnerabilities that sophisticated attackers could exploit, emphasizing the significance of embracing multi-layered security approaches.
๐ก๏ธ Disclaimer: This exploration serves solely for educational purposes, aiming to deepen comprehension of EDR bypass strategies for enhanced defense mechanisms. The primary objective? Strengthening cybersecurity infrastructures.
Ref: Ammar. A
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBroken Access Control: From Password Reset to Mass Account Takeover
A critical vulnerability in the password reset functionality of an API endpoint (/api/u/resetPwd). Hereโs how it unfolded:
1๏ธโฃ The endpoint accepts a username parameter and sends a password reset link to the user's email.
2๏ธโฃ The use of "u" in the endpoint (u=user) hinted that other roles like admin (a=admin) or superuser (su) might exist.
3๏ธโฃ Attempts to reset admin passwords via /api/admin/resetPwd and /api/administrator/resetPwd failed.
4๏ธโฃ However, /api/su/resetPwd worked, allowing me to reset the superuser password!
5๏ธโฃ The reset mechanism generated predictable passwords like username + ab12*. For example, resetting for admin resulted in adminab12*.
๐ฏ Impact: This flaw allowed unauthorized access to critical accounts, leading to mass account takeover.
Ref: Amit Kumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
A critical vulnerability in the password reset functionality of an API endpoint (/api/u/resetPwd). Hereโs how it unfolded:
1๏ธโฃ The endpoint accepts a username parameter and sends a password reset link to the user's email.
2๏ธโฃ The use of "u" in the endpoint (u=user) hinted that other roles like admin (a=admin) or superuser (su) might exist.
3๏ธโฃ Attempts to reset admin passwords via /api/admin/resetPwd and /api/administrator/resetPwd failed.
4๏ธโฃ However, /api/su/resetPwd worked, allowing me to reset the superuser password!
5๏ธโฃ The reset mechanism generated predictable passwords like username + ab12*. For example, resetting for admin resulted in adminab12*.
๐ฏ Impact: This flaw allowed unauthorized access to critical accounts, leading to mass account takeover.
Ref: Amit Kumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAnti Forensic Techniques Repositories #1
Anti Forensic Techniques
https://lnkd.in/dWmF3ikg
Awesome Anti Forensic by Shadawck
https://lnkd.in/dm2MFpV6
Anti Forensic Techniques by Hacktricks
https://lnkd.in/dimT7PJb
Windows Anti Forensic Script by MikeHorn
https://lnkd.in/d2h39Kg2
Anti Forensic Detection Tool by kuritsutianu
https://lnkd.in/dq4-7T9m
Anti Forensics Tool For Red Teamers by PaulNorman01
https://lnkd.in/d9A7t_Tx
AntiForensic.NET :: Windows anti-forensics made easy by hsheric0210
https://lnkd.in/dMsRJRYR
Anti Forensic Study by CCDCOE
https://lnkd.in/djhFgdqz
Ref: Joas A Santos
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Anti Forensic Techniques
https://lnkd.in/dWmF3ikg
Awesome Anti Forensic by Shadawck
https://lnkd.in/dm2MFpV6
Anti Forensic Techniques by Hacktricks
https://lnkd.in/dimT7PJb
Windows Anti Forensic Script by MikeHorn
https://lnkd.in/d2h39Kg2
Anti Forensic Detection Tool by kuritsutianu
https://lnkd.in/dq4-7T9m
Anti Forensics Tool For Red Teamers by PaulNorman01
https://lnkd.in/d9A7t_Tx
AntiForensic.NET :: Windows anti-forensics made easy by hsheric0210
https://lnkd.in/dMsRJRYR
Anti Forensic Study by CCDCOE
https://lnkd.in/djhFgdqz
Ref: Joas A Santos
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAwesome Security - A collection of awesome software, libraries, documents, books, and resources about security.
๐https://lnkd.in/dGb2hzyY
Awesome Web Security - Web Security materials and resources for cutting-edge penetration techniques.
๐https://lnkd.in/d3kxd9ik
โญ๏ธAwesome Machine Learning for Cyber Security Tools and resources on machine learning for cybersecurity.
๐https://lnkd.in/dZPtJmXV
โญ๏ธawesome-web-hacking - Resources for learning about web application security.
๐https://lnkd.in/dqmeXsgj
โญ๏ธawesome-mobile-security - Maintained by @vaib25vicky with contributions from the security and developer communities.
๐https://lnkd.in/dbbvfeYT
โญ๏ธawesome-threat-intelligence - A curated list of awesome Threat Intelligence resources.
๐https://lnkd.in/dSPyZAQn
awesome-security-hardening - Collection of security hardening guides, best practices, and tools.
๐https://lnkd.in/de_PyRxH
security-hardening
โญ๏ธAwesome Cyber Security - A collection of software, libraries, documents, and resources about security.
๐https://lnkd.in/dXztUHKk
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐https://lnkd.in/dGb2hzyY
Awesome Web Security - Web Security materials and resources for cutting-edge penetration techniques.
๐https://lnkd.in/d3kxd9ik
โญ๏ธAwesome Machine Learning for Cyber Security Tools and resources on machine learning for cybersecurity.
๐https://lnkd.in/dZPtJmXV
โญ๏ธawesome-web-hacking - Resources for learning about web application security.
๐https://lnkd.in/dqmeXsgj
โญ๏ธawesome-mobile-security - Maintained by @vaib25vicky with contributions from the security and developer communities.
๐https://lnkd.in/dbbvfeYT
โญ๏ธawesome-threat-intelligence - A curated list of awesome Threat Intelligence resources.
๐https://lnkd.in/dSPyZAQn
awesome-security-hardening - Collection of security hardening guides, best practices, and tools.
๐https://lnkd.in/de_PyRxH
security-hardening
โญ๏ธAwesome Cyber Security - A collection of software, libraries, documents, and resources about security.
๐https://lnkd.in/dXztUHKk
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
๐ฆOTP Bypass on Register account via Response manipulation:
1. First Method
1. Register account with mobile number and request for OTP.
2. Enter incorrect OTP and capture the request in Burpsuite.
3. Do intercept response to this request and forward the request.
4. response will be
{"verificationStatus": false, "mobile": 9072346577", "profileld": "84673832"}
5. Change this response to
{"verificationStatus": true, "mobile": 9072346577", "profileId": "84673832" }
6. And forward the response.
7. You will be logged in to the account.
Impact: Account Takeover
2. Second Method.
1. Go to login and wait for OTP pop up.
2. Enter incorrect OTP and capture the request in Burpsuite.
3. Do intercept response to this request and forward the request.
4. response will be <error>
5. Change this response to
success
6. And forward the response.
Ref: Het Vikam
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
1. First Method
1. Register account with mobile number and request for OTP.
2. Enter incorrect OTP and capture the request in Burpsuite.
3. Do intercept response to this request and forward the request.
4. response will be
{"verificationStatus": false, "mobile": 9072346577", "profileld": "84673832"}
5. Change this response to
{"verificationStatus": true, "mobile": 9072346577", "profileId": "84673832" }
6. And forward the response.
7. You will be logged in to the account.
Impact: Account Takeover
2. Second Method.
1. Go to login and wait for OTP pop up.
2. Enter incorrect OTP and capture the request in Burpsuite.
3. Do intercept response to this request and forward the request.
4. response will be <error>
5. Change this response to
success
6. And forward the response.
Ref: Het Vikam
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ