Welcome back to the channel guys, in this episode we will be covering phone number authentication bypass. It can be categorised as P2,P3,P4 or P5. It depends where the authentication function is present.
We can do this by simply manipulating the data present in response. Watch the full video for complete POC.
Sample Report - pastebin.com/wwg1zFg0
Do comment if you have any doubt and do like and subscribe the channel for more such cybersecurity related content.
#bugbounty #bugbountytips #cybersecurity #howto #paymentmanipulation
コメント