当前位置:网站首页>Logical vulnerability - arbitrary account registration
Logical vulnerability - arbitrary account registration
2022-07-26 21:36:00 【jjj34】
1. Mailbox not verified / cell-phone number
Mailbox not verified / Mobile phone number scenario : At present, many applications are for the convenience of users to record their user names and passwords , You can use email and mobile number as user name .
therefore , Many applications require users to fill in when registering , In general , The application will send activation information , The user can log in after receiving the activation information
However , Sometimes developers don't Don't check email / Whether the mobile phone number is valid , So you can take advantage of this defect , Register any account
After filling in the email , No activation information was found in email , And the mailbox can be directly used as the user login

Suppose this mailbox has been used , This will cause the mailbox to have two passwords , Both passwords can log in
2. Bulk registration
Script batch registration causes server dos Application layer attack , Affect the normal use of the website , Usually, because there is no verification code on it or the verification code is unsafe, scripts can be written for batch registration
Case study : When registering bp Grab the bag , Then blast the user name
Because there is no verification code or the verification code can be bypassed ( Too simple. ), Send directly to intruder Module , Blasting , You can register accounts in batches

3. Personal information forgery
If there is ID card information registration , It can be constructed arbitrarily to bypass ID card and name
The website itself has no authority to verify whether your ID card is right or wrong , Directly forge a greater than 18 You can bypass the anti addiction system at the age of

4. Front end verification audit bypasses
Fill in any registration information , The server will audit the registration information , For example, whether there are malicious labels , Judge the front end by returning the status , Once the value is edited, it can be bypassed
Steps are as follows :1. Use the normal account to change the password , Get verification code , Fill in any verification code
2. Use bp Grab the bag , The server will return information such as verification code error , But we can use the correct information to replace ( Premise : We normally changed the password once )
The specific test method and verification code foreword verification are the same , No more details here
5. mailbox / Mobile number registration activation verification bypasses
To prevent malicious users from arbitrarily registering accounts , Most websites will enter email address in user registration / Verify the authenticity of the mobile phone number , But sometimes the returned verification code information will be directly hidden in the returned package , It's just not displayed on the front , Or you can change your mobile number by capturing packets / mailbox , Falsify this information , Hijack to authentication information
Take the return of a verification information as an example , The vulnerability is that when sending authentication information, the authentication information will be sent to the return package at the same time and used in the front end hidden Attribute hiding , So you can check the source code directly

6. User name override
In penetration testing , This kind of situation can exist : There is already a user name in the database called a 了 , But a new user has registered an account , The user name of the new user is also called a, But the developer did not prompt for duplicate user names , Instead, insert the data directly into the database , As a result, the user name of the old user is overwritten
When logging in to view, you get other user information of the user with the same name in the database , Lead to the disclosure of other user information , Or when the user name is verified to exist , The data obtained from the front end is different from the data obtained from the database , But when writing to the database, the same part is written

Pictured ,admin The user has two passwords , May lead to admin User is embezzled
边栏推荐
- 加载 iframe 时显示加载指示器
- 一些意想不到的bug记录
- Browser browser cache
- Solution to the problem of sticking and unpacking TCP
- Live broadcast appointment award | senior consultant xuyanfei: how does efficiency measurement help efficient and sophisticated outsourcing management
- js点击图片打印图像
- Retrieve the parameters in this method in idea for our use -- 1. Class diagram. 2. Double click shift
- Japan approves the export of EUV photoresist to South Korea, and the crisis of Samsung and SK Hynix may be alleviated
- word-break: break-all VS word-wrap: break-word
- Industrial basic IFC - extract model structure tree
猜你喜欢

Set the template of core configuration file in idea

Registration conditions for information system project managers in the second half of 2022 (soft examination advanced)
![[HCIA security] NAT network address translation](/img/10/3b4d011963e00229d73a7435ce8c4b.png)
[HCIA security] NAT network address translation

如何在一个项目中使用多种不同的语言?

补充—非线性规划

Deepfake pinches his face. It's hard to tell whether it's true or false. Tom Cruise is more like himself than himself!

Live broadcast appointment award | senior consultant xuyanfei: how does efficiency measurement help efficient and sophisticated outsourcing management

Devsecops, speed and security

2022 open atom global open source summit agenda express | list of sub forum agenda on July 27

Summary of common interview questions of computer composition principle, including answers
随机推荐
任正非再谈美国打压:活下去就是胜利,要战胜美国
How to enter the specified user method body when debugging in idea?
成功上岸了自动化测试岗,最高月薪15.4K,自己真棒~
Multivariable time series prediction using LSTM -- problem summary
In depth study of efcore migrations
[hero planet July training leetcode problem solving daily] 26th and check the collection
(C语言)浅识#define
golang版本管理gvm
[HCIA security] bidirectional nat
2022年简历石沉大海,别投了,软件测试岗位饱和了....
CMake 的使用
Serial port communication failure
Six instructions of Memcache based caching mechanism
How to use multiple languages in a project?
Filtering and distortion
七、微信小程序运行报错:Error: AppID 不合法,invalid appid
Computer professional interview topic summary, general navigation
Set the template of core configuration file in idea
三星发布1.08亿像素图像传感器ISOCELL Bright HMX,小米将首发
织梦文档关键词维护不管用