Authentication Vulnerabilities - Lab #3 Password reset broken logic | Long Version

preview_player
Показать описание
In this video, we cover Lab #3 in the Authentication module of the Web Security Academy. This lab's password reset functionality is vulnerable. To solve the lab, we reset Carlos's password then log in and access his "My account" page.

Your credentials: wiener:peter
Victim's username: carlos

▬ ✨ Support Me ✨ ▬▬▬▬▬▬▬▬▬▬

▬ 📚 Contents of this video 📚 ▬▬▬▬▬▬▬▬▬▬
00:00​​​ - Introduction
01:22 - Navigation to the exercise
01:47 - Understand the exercise and make notes about what is required to solve it
02:21 - Exploit the lab
05:09 - Script the exploit in Python
14:09 - Summary
14:20 - Thank You

▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Рекомендации по теме
Комментарии
Автор

The update to the Web Security Acad emy Series course has gone l ive! To celebrate the launch, here's a *50% off coupon: LAUNCH50OFF. The coupon is valid for the first 100 individuals!* Half the coupons have already been taken!

The Web Security Academy Series course now:

🐞 Covers 12 vulnerability categories
⏯ Contains 140+ videos
⏳ Contains 50+ hours of HD content
🧪 Provides walkthroughs of 119 labs
➕ and much more!

RanaKhalil
Автор

Please which is the best Python course, what do you recommend?? Can you open the python Course?

davidardo
Автор

why we are using python we did it manualy using burpsuite then...

the_py_coder
Автор

Can you make one Big playlist so i Can listen while i Fall asleep

mrmarcus
Автор

Looking at this from a realistic view, are we supposed to have the victim's reset email link? Of course, no!

If we are to exploit our own credentials using HTTP requests, how do we exploit the victim if the only information we have about him/her is just the username?

dr.b
Автор

someone how can i not remember simple stuff like this sometimes
edit: abit stoned so maybe the reason

xgreyhound
welcome to shbcf.ru