Top 25 Account Takeover Bug Bounty Reports
In this article, we will discuss the Account Takeover attack, and present 25 disclosed reports based on this issue.
What is Account Takeover?
Account Takeover of Account Hijacking is the form of attack through which a threat actor gains access to an user account that he/she doesn’t have access to. From my perspective, it is more like a result from exploitation of one or more vulnerabilities. There are multiple ways to find an account takeover, which we are going to discuss in the next section.
My favorite methods of Account Takeover/Hijacking
Here are some of my favorite methods or ways to hijack an account during a Web Penetration Testing Assessment or Bug Bounty Research:
- Through vulnerabilities that require user interaction: Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), Session Fixation, and so on
- Through forgot password feature: Disclosure, Predict, or Brute-Force of reset password tokens
- Through weak session identifiers: Session cookies unrandomized and predictable (example: incremental), vulnerable JWT tokens (without proper checks on signature)
- Through flaws in authentication mechanism: Tampering with the parameters within…