Hey Guys, Its KRiPPto99 Back again. In today’s blog I’m going to show you How can anyone bypass OTP and take over his account And also you need a Burpsuite
What is OTP?
onetime password, or commonly called OTP, is auto generated 3 to 6 digit number code that authenticate a user to their account. the OTP acts as also more secure password, especially if the users password is weak or reused
Description of Vulnerability:
Lets suppose there is site called example.com and when you checkout the site there is login and create option will be there so just need to lookup there below there are steps I’m going to show you how did I bypassed OTP in my case
Before get started please learn basics of Burp Suite
Lets get started then!!!!!!!!!!!
Steps To Perform
Method 1: OTP Bypass Leads To Account Takeover
step 1: visit to site choose create a account fill up details
step 2: For number fill up you’re number and wait for OTP it will ask us fill up OTP that time randomly put any number for OTP section
step 3: after putting any random OTP just intercept the request in Burp Suite
step 4: when you get the request lookup and select on do intercept response only like below image
step5: forward the request until you get the request like below image as we get response here we just need do small changes here
step6: now time just need to change code 1 to 0 and invalid to valid otp that’s it like below image shared
step7: Boom!! Boom!! Just like that we did we just bypassed OTP and this also leads to account takeover
Method 2: OTP Bypass by Brute-force
this is another method which I’ve been came across int his method I noticed there is 4 digit OTP which I’ve been came up with this idea
Step1: suppose there is site called example.com input the number and top of your choice
step2: use the Burpsuit and intercept the request before submit button
step3: forward the request until you notice there in request page there OTP is been displayed suppose 000 is our OTP then there will be that OTP
step4: send request to intruder select sniper attack clear all and just add $ to OTP for example $0000$ and in the
step5: in position tab do what below I did in image
step6: press on start attack that’s it!!! boom!!!!!!!
step7: we get to notice that out this combination we get to see different digit and that’s the OTP
Method3: OTP bypass through response manipulation
step1: lets take a target site called targetsite.com where we need to put our number and wait for it
step2: we been requested to input OTP here OTP need to input in 6 digit in my case
step3: input random any 6 digit and intercept request in Burpsuit before click
step4: In Burpsuit forward the request until you see there is OTP now click on request and click on do intercept> response to this request
step5: here in response we came across there will be error try to change that error to success we need to manipulation just like that, fail to success, 0 to 1 like this manipulation we need to do
step6: Forward the request and success here we go Boom!!!!
SEEYAA FOR TODAY GUYS HAPPY SAFE SEARCH!!!!!!!!!!!