Account verification code bypass lead to a $4000 bounty

{
"otp":[
"1234",
"1111",
"1337",
"2222",
"3333",
"4444",
"5555"
]
}

--

--

--

https://twitter.com/tabaahi_

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Cryptography: Quick and dirty way to solve (almost) every substitution code.

Announcing Fortanix Self-Defending KMS integration with Cohesity |Fortanix Blog

Apps Seeking Permissions: Shouldn’t It Be Transparent For Customers?

Beosin’s Recommendation for Tracing Jay Chou’s Stolen NFT Worth Over $1M: Analysis of the Stolen…

Omer Hamerman of ProdOps: 5 Things You Need To Know To Optimize Your Company’s Approach to Data…

AMA Recap| BitWell * PlatON — The B-Side of Data: Privacy and Security

How to Fix My Domain Name Not Working

This is an FPS in Virtual Reality via /r/videos https://t.co/6fGf0Gc1zN

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Mohsin khan

Mohsin khan

https://twitter.com/tabaahi_

More from Medium

Worst Bug bounty sites you should avoid

Business Logic Vulnerabilities (easy hit) Bug-Bounty

P1 Bug — PII information disclosure

How We hacked (bypassed) Admin Panel just by Js file