New Method For Account Takeover In Android Applications

 Today I have some important news to share with you about a novel way to get around OTP (One-Time Password) systems. The knowledge gained from this discovery could help us better understand security flaws and strengthen the overall security of sensitive data.

I recently discovered a previously unrecognised vulnerability that enables the bypassing of OTP mechanisms during my research in the area of cybersecurity. OTPs are frequently used in a number of applications, such as online banking, two-factor authentication (2FA), and account recovery procedures, as an extra layer of security.

I have created a novel strategy that highlights a potential flaw in OTP systems' implementation by carefully examining their internal workings. For security reasons, I am unable to go into specific technical details, but I can assure you that this vulnerability has been thoroughly examined and verified.

Impact:- The importance of this discovery lies in its potential to help organisations, security professionals, and developers fortify their systems against such bypass techniques. By drawing attention to this flaw, I hope to increase understanding of the difficulties OTP-based security systems encounter and promote the adoption of more robust security measures. 

Proof Of Concept:- 

1. Open the mobile app, enter mobile number, and submit the request.
2. After capturing the request, intercept it and copy the OTP that is MD5-encoded.


 

3. Decode the code on the Crackstation website, then copy the resulting OTP.


4. Now that you have the OTP, open the application and enter it.


5. You can now see a successful login and a compromised account. 

 

 How to avoid OTP bypass (recommendation):

- Avoid responding with your OTP.
- OTP must not be sent in an HTTP response.
- Each request should use a different OTP, which should expire after one use.
- Use rate-limiting techniques to thwart brute-force assaults.
- Use time-based OTPs with a short expiration time.


    Owner of the application fixed my reported bug

0 Comments

Manan Sapariya 'Ethical Hacker | Security Researcher | Bug bounty hunter.

mannsapariya004@gmail.com