How I was able to get account takeover via IDOR form JWT
Tags
attack-pattern: | Data Javascript - T1059.007 Python - T1059.006 Vulnerabilities - T1588.006 Brute Force - T1110 |
Common Information
Type | Value |
---|---|
UUID | f7378b6b-77f5-452b-845e-c4c771eded8a |
Fingerprint | 38b35ad902af74e3 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | June 7, 2023, 2:10 a.m. |
Added to db | June 10, 2023, 12:54 p.m. |
Last updated | Nov. 17, 2024, 11:36 p.m. |
Headline | How I was able to get account takeover via IDOR form JWT |
Title | How I was able to get account takeover via IDOR form JWT |
Detected Hints/Tags/Attributes | 28/1/14 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Details | 168 | ✔ | Infosec on Medium | https://medium.com/feed/tag/infosec | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 1 | redirect.com |
|
Details | Domain | 1 | api.redirect.com |
|
Details | Domain | 2 | www.redirect.com |
|
Details | Domain | 1175 | gmail.com |
|
Details | 1 | mohamed@gmail.com |
||
Details | File | 1 | hex4.txt |
|
Details | File | 1 | rahim_allah_alfataa_salah.txt |
|
Details | File | 72 | response.json |
|
Details | File | 4 | timestamp.txt |
|
Details | File | 1 | jadak_alghaithu.txt |
|
Details | File | 1 | brute_force.txt |
|
Details | File | 1 | hack_hack.py |
|
Details | Url | 1 | https://www.redirect.com |
|
Details | Url | 1 | https://api.redirect.com/profile |