Sitemap
respon status

MY First Bounty | Pre Account take Over via respon manipulation| Pre ATO

2 min readJun 27, 2025

Hello everyone, today is a special day for me, i am very happy because this is the first time a got a bug and paid, so i want to share a little about this finding, ok just go ahead.

So my finding is otp bypass lead to acount take over via respon manipulation, that day i was confused because everyday i always get informative bug, even out of scope because i don’t read the information in the program guidelines hahaha 😅😅.

After after reading a lot of writeups, watching some poc on youtube, i finally found a website that intrested me, i finally hunted there, and it turned out that the website required otp verification via email and number phone, i also remembered the poc that i had watched, then i rushed to try it

Step to reproduce:

  1. In the target web app, i creat acoount using email normally, in the register respon section, there is a json succes respon then i save it.

`

{

“status”: “200”,

“succes”:”succes”,

“message”:”register succes”,

“email”:”[your email]”

}

  1. After that, i create new account dan pada bagian otp saya memasukan nomor otp secara acak.
  2. Before sending otp, first turn on burpsuite intercept, then click send the otp with random number earlier.
  3. In the otp request section, right-clik and do intercept, then forward
  4. Then in the response section, change the json error to json succes that we saver earlien in the step 1. then forward again
  5. And well, the account succesfully created and can do account registeration as usual

Usually pre account take over many do not accept it, but maybe this is a financial services company, and there is an otp that protects it, so they accept it.

thanks for reading.

Best regard: NERVHYM

--

--

No responses yet