Bug Hunter Handbook
  • Introduction
  • Getting Started in InfoSec and Bug Bounties.
  • Presentations
  • Checklists / Guides
  • Useful Twitter Threads
  • List of Vulnerabilities
    • Recon and OSINT
      • Recon
      • Sensitive information using Github
      • Subdomain Enumeration
        • Resolvers
      • Javascript Enumeration
      • After Recon
      • Finding Information Using Public Resources
      • OSINT
      • Cloud
      • Wayback
      • Parameter / Content Discovery
      • Broken Link Highjacking
    • Host Header
    • Injection
      • Other Injection
    • DNS Rebinding
    • Cross Site Scripting (XSS)
      • Weaponizing XSS
      • WAF Bypass
    • Cross Origin Resource Sharing (CORS)
    • Local / Remote File Inclusion (LFI / RFI)
    • Server Side Request Forgery (SSRF)
    • Remote Code Execution (RCE)
    • XML Entity Injecton (XXE)
    • Price Manipulation
    • Directory / Path Traversal
    • Cross Site Request Forgery (CSRF)
      • JSON CSRF
    • Password Reset
    • Login Page Issues
    • Deserialization Attacks
    • File Upload
    • Account Takeover
    • Insecure Direct Object References (IDOR)
    • Open Redirect
    • Business Logic Flaws
    • Rate Limit Bypass / 2FA / OTP Bypass
    • Ruby on Rails
      • Mass Assginment
    • S3 Bucket
    • Race Condition
    • CRLF
    • SSTI
    • Prototype Pollution
  • Approach
  • API Security
  • Mobile Security
  • Fuzzing / Wordlists
  • BugBounty Short Write-ups
  • Burp Suite Tips and Tricks
  • HackerOne Reports
  • Response Manipulation
  • Client Vs Server Side Vulnerabilities
  • DevSecOps
  • Containers
    • Docker
    • Kubernetes
    • Containers
  • AWS
  • Azure
  • Others
    • Code Review
    • Web Sockets
    • Web Cache
    • HTTP Desync Attacks
    • Zone Transfer
    • CSP Bypass
    • Payment Bypasses
    • Http Parameter Pollution
    • Postmessage
    • Others
    • GraphQL
    • Unix / Linux
    • Email Related
    • Dependency confusion
    • Nginx Misconfigs
    • JIRA
    • OAUTH
  • Chaining of Bugs
  • Bug Bounty Automation
  • Mindmaps
  • Oneliner Collections
  • Red Teaming
  • Blue Teamining
  • Recon One Liners
  • Misc
  • Wordpress
  • Fuzzing / FuFF
  • OWASP ZAP
  • Bug List
  • Setting up burp collaborator
  • Admin Panel PwN
  • Credential Stuffing / Dump / HaveibeenPwned?
  • Tools Required
  • Nuclei Template
  • Other BugBounty Repos / Tips
  • Interview
  • Threat Modelling
  • AppSec
Powered by GitBook
On this page

Was this helpful?

  1. List of Vulnerabilities

Password Reset

PreviousJSON CSRFNextLogin Page Issues

Last updated 3 years ago

Was this helpful?

Blogs / Articles:

  • Forgot/Reset Password Test Cases -

Write-ups:

Mindmaps / Image References:

Tweets:

When testing password fields, my preferred password is:
%01%E2%80%AEalert%0D%0A

Let's break it down:
%01 is SOH
%e2%80%ae is RTLO
%0d%0a is CRLF

Test cases on login:
1. can I log in only using %01?
2. without the CRLF in it?
3. is trela accepted instead of alert? (due to RTLO)

https://twitter.com/secalert/status/1353303406044184577?s=20

http://imranparay.blogspot.com/2018/09/testing-password-reset-functionalities.html
https://0xayub.gitbook.io/blog/
https://www.anugrahsr.me/posts/10-Password-reset-flaws/
https://twitter.com/cyph3r_asr/status/1433392117825499141?s=20
https://speakerdeck.com/anugrahsr/playing-with-password-reset-functionality
https://link.medium.com/OVvYaKLng3
https://link.medium.com/HZpTPtR2F3
https://link.medium.com/bpYhuYR2F3
https://link.medium.com/5PnwoRS2F3
https://link.medium.com/A67jqlT2F3
https://thezerohack.com/hack-instagram-again…
https://ninadmathpati.com/how-i-was-able-to-earn-1000-with-just-10-minutes-of-bug-bounty…
https://link.medium.com/MgdJoyY2F3
https://link.medium.com/iRVWjs02F3
https://link.medium.com/roeUih12F3
https://medium.com/@fatnassifiras45/how-i-was-able-to-take-over-any-account-via-the-password-reset-functionality-ef1659f8b481
https://hackerone.com/reports/792895
https://twitter.com/cyscol/status/1295805411241725954
https://twitter.com/HusseiN98D/status/1254888748216655872
When testing password fields, my preferred password is: %01%E2%80%AEalert%0D%0A
Let's break it down: %01 is SOH %e2%80%ae is RTLO %0d%0a is CRLF
Test cases on login: 1. can I log in only using %01? 2. without the CRLF in it? 3. is trela accepted instead of alert? (due to RTLO)
https://twitter.com/N008x/status/1302515523557548032