Udemy - Host Header Injection password reset poisoning Bug Bounty
"softddl.org"
15-09-2021, 19:16
-
Share on social networks:
-
Download for free: Udemy - Host
-
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 5 lectures (1h 1m) | Size: 459.8 MB
Bug Bounty course
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 5 lectures (1h 1m) | Size: 459.8 MB
Bug Bounty course
What you'll learn:
bug bounty
website security
Host header injection
password reset poisoning
Requirements
basic web technology knowledge
laptop
Description
HTTP Host header attacks
In this section, we'll discuss how misconfigurations and flawed business logic can expose websites to a variety of attacks via the HTTP Host header. We'll outline the high-level methodology for identifying websites that are vulnerable to HTTP Host header attacks and demonstrate how you can exploit this. Finally, we'll provide some general guidance on how you can protect your own websites.
Password Reset Poisoning
A common way to implement password reset functionality is to generate a secret token and send an email with a link containing this token. What could happen if an attacker requests a password reset with an attacker controlled host header?
If the web application makes use of the host header value when composing the reset link, an attacker can poison the password reset link that is sent to a victim. If the victim clicks on the poisoned reset link in the email, the attacker will obtain the password reset token and can go ahead and reset the victim's password.
Detecting Password Reset Poisoning vulnerabilities
We'll use an old version of Piwik (an open source web analytics platform) which was vulnerable to password reset poisoning via a host header attack for demonstration of this vulnerability.
In order to detect password reset poisoning automatically, we'll need to rely on an intermediary service since the detection of password reset poisoning via a host header attack requires an out-of-band and time-delay vector. Acunetix solves this by making use of AcuMonitor as its intermediary service during an automated scan.
During a scan, Acunetix will locate the password reset page and inject a custom host header pointing to an AcuMonitor domain. If vulnerable, the application in question (an old version of Piwik in this example) will generate the password reset link using this value and send an email to the user concerned as follows.
Who this course is for
bug bounty hunter and penetration tester
Homepage
https://www.udemy.com/course/host-header-injection-password-reset-poisoning-bug-bounty/
Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me
https://hot4share.com/vzbs7rpdrk2d/ho0ql.Host.Header.Injection.password.reset.poisoning.Bug.Bounty.rar.html
https://uploadgig.com/file/download/2D3f5f0aAa3573eB/ho0ql.Host.Header.Injection.password.reset.poisoning.Bug.Bounty.rar
https://rapidgator.net/file/7da9bdba5cae3b32d506946de10f3681/ho0ql.Host.Header.Injection.password.reset.poisoning.Bug.Bounty.rar.html
++++++++++++++++++++++++++
https://ddownload.com/56jxkyzcle8g/ho0ql.Host.Header.Injection.password.reset.poisoning.Bug.Bounty.rar
Links are Interchangeable - No Password - Single Extraction
The minimum comment length is 50 characters. comments are moderated