انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Ep. 1 – Breaking OTP Security, Exploiting Static Domains & Privilege Escalation via Role Misconfigurations
Manage episode 464012183 series 3643227
What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges?
In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor oversights into critical exploits:
- Leaking OTPs in API responses – Breaking authentication at the source.
- Static domain to account takeover – When persistence turns into a full exploit.
- Privilege escalation via role mismanagement – How attackers bypass access controls.
Learn how these vulnerabilities were discovered, exploited, and mitigated.
Chapters:
00:00 - INTRO
01:00 - FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses
05:20 - FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence
12:05 - FINDING #3 - Privilege Escalation via User Invitations and Role Assignment
16:49 - OUTRO
Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us → [email protected]
🔗 Podcast Website → Website Link
فصول
1. INTRO (00:00:00)
2. FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses (00:01:00)
3. FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence (00:05:20)
4. FINDING #3 - Privilege Escalation via User Invitations and Role Assignment (00:12:05)
5. OUTRO (00:16:49)
14 حلقات
Manage episode 464012183 series 3643227
What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges?
In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor oversights into critical exploits:
- Leaking OTPs in API responses – Breaking authentication at the source.
- Static domain to account takeover – When persistence turns into a full exploit.
- Privilege escalation via role mismanagement – How attackers bypass access controls.
Learn how these vulnerabilities were discovered, exploited, and mitigated.
Chapters:
00:00 - INTRO
01:00 - FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses
05:20 - FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence
12:05 - FINDING #3 - Privilege Escalation via User Invitations and Role Assignment
16:49 - OUTRO
Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings → https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us → [email protected]
🔗 Podcast Website → Website Link
فصول
1. INTRO (00:00:00)
2. FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses (00:01:00)
3. FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence (00:05:20)
4. FINDING #3 - Privilege Escalation via User Invitations and Role Assignment (00:12:05)
5. OUTRO (00:16:49)
14 حلقات
كل الحلقات
×مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.