Insights
Server confirmed that password reset token was sent and returned date in its header:
The date returned by the server will be used in further steps – it would be the one used in the process of generating the password reset token.
The reset token was a result of a MD5 hashing function, so the first thing that I've checked was conjunctions of timestamp/date with just an e-mail address. Results unluckily weren’t positive – generated token must've had at least a third factor. An example of some tried conjunctions are shown below:
Knowing that there's a third unknown factor, we'll use "advanced password recovery" software, which is hashcat. Provided that we know part of the original string, we'll use a combinatory attack mode that will combine two dictionaries – the first dictionary will consist of known permutations of date and e-mail address, the second will be just a standard dictionary used to break hashes (in this example rockyou.txt). The final command is presented below:
After running the command, I noticed that hashcat successfully broke the hash:
It's visible that third factor was just a word secret.
Then I copied the date from the response and transformed it into timestamp:
After that, I created my own token and used MD5 hash function:
The next step was verifying whether I will be able to successfully reset password with created token: Server responded with confirmation of password reset – confirming that vulnerability was properly identified and can be easily exploited:
Server responded with confirmation of password reset – confirming that vulnerability was properly identified and can be easily exploited:
The last step was doing the same thing, but with the admin's account. I requested password reset for an application admin account and was able to successfully reset its password – gaining the highest possible privileges in the application from an unauthorized user. Recommendations When generating password reset token ensure that generated tokens or codes are: • Randomly generated using a cryptographically safe algorithm,

In today's world, ensuring the security of our accounts is more crucial than ever. Just as keys protect the doors to our homes, passwords serve as the first line of defense for our data and assets. It's easy to assume that technical individuals, such as developers and IT professionals, always use strong, unique passwords to keep ...

SOCMINT is the process of gathering and analyzing the information collected from various social networks, channels and communication groups in order to track down an object, gather as much partial data as possible, and potentially to understand its operation. All this in order to analyze the collected information and to achieve that goal by making …

PyScript – or rather Python in your browser + what can be done with it? A few days ago, the Anaconda project announced the PyScript framework, which allows Python code to be executed directly in the browser. Additionally, it also covers its integration with HTML and JS code. An execution of the Python code in …