Here's How You Can Bypass Host Header Injection Protection In Modern Web App | 2025

Поділитися
Вставка
  • Опубліковано 1 лют 2025

КОМЕНТАРІ • 37

  • @BePracticalTech
    @BePracticalTech  11 днів тому +3

    Article Link: medium.com/@deepanshudev369/interesting-story-of-an-account-takeover-vulnerability-140a45a058a3

  • @erwin166
    @erwin166 5 днів тому

    I understand that, in order to exploit this type of vulnerability, I need to create a website that uses the same domain name I replaced in the Host header. Thanks for the video !! 👍

  • @dittonachan
    @dittonachan 11 днів тому +1

    Great video, Thank you brother, your videos always add values.

  • @Muby_Ajiwa
    @Muby_Ajiwa 8 днів тому

    Great video. Your videos always helpful. Thanks you very much

  • @ElamibongoMashele
    @ElamibongoMashele 8 днів тому

    Nice explanation

  • @AttackerShihab
    @AttackerShihab 11 днів тому

    Great brother . Plz solve all portswigger lab

  • @a.c.5985
    @a.c.5985 10 днів тому

    Very nice

  • @86_ujjwalsaran71
    @86_ujjwalsaran71 10 днів тому +1

    Can you explain through vidoe that we can perform ATO step by step

  • @rohankar1307
    @rohankar1307 11 днів тому

    Thanks for the video is there way we can get the reset token before it going to mailbox .

  • @jxkz7
    @jxkz7 11 днів тому

    Nice one

  • @velmuruganjk5467
    @velmuruganjk5467 10 днів тому

    Shall we try these bypass methods in cors too.

  • @bkg2190
    @bkg2190 10 днів тому

    Nice 👍

  • @Glocksxaks
    @Glocksxaks 5 днів тому

    please what’s the telegram link

  • @4xoxo0
    @4xoxo0 11 днів тому +1

    today , while testing one of bb website, i see when i go to signup using phone number , the otp is leaked in response of burp suite. & i can login/signup with any phone number. when i have submited , then the trigger marked as N/A.

    • @snipertech365
      @snipertech365 11 днів тому

      @@4xoxo0 after completed verification by the otp. I can get in response. Its not be a vulnerability. But that's is not a good practice for a web application. They should use only valdation result in response.

    • @erroreboy19mask20
      @erroreboy19mask20 10 днів тому

      Then add hackerone mediation team!

  • @shortclips3548
    @shortclips3548 9 днів тому

    but u did not use the burp collaborator

  • @om3726
    @om3726 11 днів тому

    Do you have a video on host header injection? I want to learn that first

    • @BePracticalTech
      @BePracticalTech  11 днів тому +1

      @@om3726 Not as of now.. But I'll definitely plan to release it soon

  • @gamingwithamit2004
    @gamingwithamit2004 11 днів тому

    Lab tutorial please 😢

  • @Ak1r4Yuk1
    @Ak1r4Yuk1 11 днів тому

    Ok but the link for password reset works only on that domani, so if you change It link Will do nothing. It Just work in subdomains

    • @BePracticalTech
      @BePracticalTech  11 днів тому +3

      @@Ak1r4Yuk1 That's not what the attack is!
      Once the victim clicks on the link and redirected to attacker's website.. The attacker will receive the reset password token on their server logs
      They can then use it to reset the password on behalf of victim

    • @youknowwhat4328
      @youknowwhat4328 10 днів тому

      ​@@BePracticalTechyou should include those words inside the video to give viewers the complete info about the vulnerability...
      Anyway video is informative....

  • @P45PU7
    @P45PU7 11 днів тому

    woww..👍

  • @aatankbadboy3941
    @aatankbadboy3941 11 днів тому +1

    Bro so simple video did not expected From you

    • @BePracticalTech
      @BePracticalTech  11 днів тому +4

      I can understand this may feel simple for you but not for others(specially beginners) i feel it's my job to let my subs know about all kind of possibilities whether it is simple or advanced

    • @aatankbadboy3941
      @aatankbadboy3941 11 днів тому

      @@musawerkhan9817 yeah long time ago

    • @gg-mr4qr
      @gg-mr4qr 11 днів тому +2

      ​@@BePracticalTech Yes but you should always add some impacts like what advantage we got through the vulnerability and how we got. That makes sense for beginners and pro both. ❤

  • @gg-mr4qr
    @gg-mr4qr 11 днів тому

    The video is missed last and most important part:
    Attacker can redirect user the remote website and the attecker got the victim password reset token! And before victim using the tocken attecker can reset the password and takeover the account🎉

  • @snipertech365
    @snipertech365 11 днів тому +3

    Its a host header injection. I don’t understand how it was cause of ATO

    • @BePracticalTech
      @BePracticalTech  11 днів тому +21

      Hi there, Let me explain it to you
      Attacker's Perspective
      1. Attacker intercepts the request
      2. The he changes the email address field to victim's account(victim@gmail.com)
      4. Changes the host header to his controlled domain(like attacker.com)
      5. Sends the request
      Victim's Perspective:
      1. Victim clicks on the link send to his email (since it will originate from legitimate email address, many people won't suspect it as malicious link)
      2. They will be redirected to attacker's website.
      At this point, the attacker will have the reset token for victim's account which he can use to reset the victim's password.
      This is known as one click account takeover because of reset password link poisoning

    • @snipertech365
      @snipertech365 11 днів тому +1

      @BePracticalTech okay bro. I Really glad to get your reply. Its captivated me. Understand, everything now cristal clear

  • @TheGreenOfficial
    @TheGreenOfficial 11 днів тому

    👍

  • @pallavipandey4944
    @pallavipandey4944 11 днів тому

    First 🔥