<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Addictive Hackers]]></title><description><![CDATA[Addictive Hackers]]></description><link>https://blog.d1pakda5.com</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1661193842938/ZQvfeSAK2.png</url><title>Addictive Hackers</title><link>https://blog.d1pakda5.com</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 12 May 2026 16:22:15 GMT</lastBuildDate><atom:link href="https://blog.d1pakda5.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Introduction To Smart Contract Auditing: Why It's Important]]></title><description><![CDATA[Smart contracts are self-executing contracts that are coded with specific conditions, rules, and terms. They are built on blockchain technology, which allows for a decentralized and transparent way of executing agreements. Smart contracts work by aut...]]></description><link>https://blog.d1pakda5.com/introduction-to-smart-contract-auditing-why-its-important</link><guid isPermaLink="true">https://blog.d1pakda5.com/introduction-to-smart-contract-auditing-why-its-important</guid><category><![CDATA[Web3]]></category><category><![CDATA[Web3 Security]]></category><category><![CDATA[Smart Contracts]]></category><category><![CDATA[smart contract security audit]]></category><category><![CDATA[smart contract audit services]]></category><dc:creator><![CDATA[Dipak kumar Das]]></dc:creator><pubDate>Sat, 22 Apr 2023 06:19:39 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1680470519526/dd29cca6-6729-4a3d-b200-a2ddaeb03455.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Smart contracts are self-executing contracts that are coded with specific conditions, rules, and terms. They are built on blockchain technology, which allows for a decentralized and transparent way of executing agreements. Smart contracts work by automatically enforcing the terms of an agreement between two or more parties, eliminating the need for intermediaries, and increasing efficiency and security.</p>
<p><strong>Benefits of Smart Contracts</strong></p>
<p>Smart contracts offer a range of benefits, including:</p>
<ol>
<li><p>Efficiency: Smart contracts can automate tasks, reducing the need for intermediaries and manual processes. This can save time, reduce costs, and improve accuracy.</p>
</li>
<li><p>Transparency: Smart contracts are recorded on a public blockchain, which means they are transparent and cannot be tampered with. This can help to build trust and reduce fraud.</p>
</li>
<li><p>Security: Smart contracts use cryptography to secure transactions, which makes them resistant to hacking and fraud.</p>
</li>
<li><p>Reliability: Smart contracts are executed automatically when specific conditions are met, which eliminates the need for human intervention and reduces the risk of errors.</p>
</li>
</ol>
<p><strong>Risks Associated with Deploying Smart Contracts Without Proper Auditing</strong></p>
<p>Despite the benefits of smart contracts, deploying them without proper auditing can pose significant risks. Some of the key risks include:</p>
<ol>
<li><p>Security vulnerabilities: Smart contracts can contain security vulnerabilities that can be exploited by hackers. These vulnerabilities can lead to the loss of funds or sensitive data.</p>
</li>
<li><p>Functionality errors: Smart contracts can contain errors in the code, which can lead to unexpected behavior and incorrect execution of the agreement.</p>
</li>
<li><p>Compliance issues: Smart contracts may not comply with legal and regulatory requirements, which can lead to legal consequences and reputational damage.</p>
</li>
<li><p>Reputation damage: A smart contract that does not function properly can lead to a loss of trust and damage to a company's reputation.</p>
</li>
</ol>
<h3 id="heading-importance-of-smart-contract-auditing"><strong>Importance of Smart Contract Auditing</strong></h3>
<p>Smart contract auditing is a critical step in the development and deployment process. Auditing helps to ensure that smart contracts are secure, functional, and compliant with legal and regulatory requirements. In this section, we will discuss the importance of smart contract auditing in more detail.</p>
<p><strong>Security: How Auditing Helps Identify and Mitigate Vulnerabilities</strong></p>
<p>Smart contracts are vulnerable to a range of security threats, including hacking, theft, and fraud. Auditing can help to identify vulnerabilities in smart contract code and mitigate the risks associated with these threats. Auditors use a range of techniques, including code review and penetration testing, to identify vulnerabilities in smart contracts.</p>
<p>Common vulnerabilities in smart contracts include reentrancy attacks, integer overflow/underflow, and logic errors. Reentrancy attacks occur when an attacker exploits a smart contract's ability to execute code multiple times within a single transaction, leading to the execution of unintended code. Integer overflow/underflow occurs when an integer value exceeds the maximum or minimum value that can be stored, leading to unexpected behavior. Logic errors occur when the code does not accurately reflect the intended business logic or rules.</p>
<p><strong>Functionality: Ensuring the Code Accurately Reflects Business Logic and Rules</strong></p>
<p>Smart contracts are designed to automate the execution of agreements between two or more parties. As such, it is essential that the code accurately reflects the intended business logic and rules. Smart contract auditing can help to ensure that the code functions as intended and that there are no errors or unintended consequences.</p>
<p><strong>Compliance: Meeting Legal and Regulatory Requirements</strong></p>
<p>Smart contracts are subject to a range of legal and regulatory requirements, including anti-money laundering (AML) and know-your-customer (KYC) regulations. Failure to comply with these requirements can result in legal and reputational consequences. Smart contract auditing can help to ensure that smart contracts comply with these requirements and avoid legal and reputational damage.</p>
<h3 id="heading-common-smart-contract-vulnerabilities">Common Smart Contract Vulnerabilities</h3>
<p>Smart contracts are complex pieces of code that are vulnerable to a range of security threats. In this section, we will discuss some of the most common vulnerabilities that smart contracts face.</p>
<p><strong>Reentrancy Attacks</strong></p>
<p>Reentrancy attacks occur when a contract is called multiple times before it has completed its previous execution. This can lead to unintended behavior, such as unauthorized transfers of funds. The most infamous example of a reentrancy attack was the DAO hack in 2016, where an attacker was able to drain millions of dollars from the DAO smart contract by exploiting a vulnerability in the code.</p>
<p><strong>Integer Overflow/Underflow</strong></p>
<p>Smart contracts rely heavily on integer values for calculations and storing data. If an integer value exceeds the maximum or minimum value that can be stored, it can lead to unexpected behavior or even crash the contract. For example, if a contract stores a user's balance as an integer value, and an attacker is able to increase the balance beyond the maximum value, it can lead to unintended behavior and a potential loss of funds.</p>
<p><strong>Logic Errors</strong></p>
<p>Logic errors occur when the code does not accurately reflect the intended business logic or rules. This can lead to unintended consequences or even a complete failure of the contract. For example, a simple logic error in a voting contract could allow an attacker to vote multiple times or change the outcome of an election.</p>
<p><strong>Other Common Vulnerabilities</strong></p>
<p>Other common vulnerabilities include:</p>
<ul>
<li><p>Time manipulation: An attacker may exploit the timestamp functionality of the contract to manipulate the execution of code.</p>
</li>
<li><p>Authorization issues: The contract may allow unauthorized users to access sensitive functions or data.</p>
</li>
<li><p>Denial-of-Service attacks: An attacker may flood the contract with a large number of requests, causing it to become unresponsive</p>
</li>
</ul>
<h3 id="heading-types-of-smart-contract-auditing">Types of Smart Contract Auditing</h3>
<p>Auditing is a critical component of smart contract development and deployment. There are three main types of auditing: manual, automated, and hybrid.</p>
<p><strong>Manual Auditing</strong></p>
<p>Manual auditing involves a team of human auditors reviewing the code line by line to identify potential vulnerabilities and bugs. This process can be time-consuming and expensive, but it is the most thorough method of auditing. Manual auditing is particularly useful for complex contracts and those with a high risk of exploitation. However, it has limitations such as human error and bias.</p>
<p><strong>Automated Auditing</strong></p>
<p>Automated auditing involves using software tools to scan the code for vulnerabilities and bugs. This process is much faster and less expensive than manual auditing, but it is also less thorough. Automated auditing is particularly useful for identifying common vulnerabilities such as reentrancy attacks and integer overflow/underflow. However, automated auditing may miss more complex vulnerabilities and can produce false positives.</p>
<p><strong>Hybrid Auditing</strong></p>
<p>Hybrid auditing involves combining manual and automated methods to create a more comprehensive auditing process. This approach combines the thoroughness of manual auditing with the speed and efficiency of automated auditing. Hybrid auditing is a popular choice for many smart contract developers and is particularly useful for large, complex contracts with a high risk of exploitation.</p>
<p><strong>Best Practices for Smart Contract Auditing</strong></p>
<p>To ensure the security and reliability of smart contracts, developers should follow best practices for auditing. These include:</p>
<ol>
<li><p>Code review process: Smart contract developers should have a thorough code review process that involves both manual and automated auditing methods.</p>
</li>
<li><p>Tools and resources: Developers should use a range of tools and resources, such as code analysis tools, security libraries, and security frameworks, to identify vulnerabilities and prevent them.</p>
</li>
<li><p>Working with auditors: Developers should work with professional auditors to ensure that their code is thoroughly reviewed and tested. This can help identify potential issues and prevent vulnerabilities.</p>
</li>
</ol>
<h3 id="heading-case-studies-past-smart-contract-security-breaches-and-impacts">Case Studies: Past Smart Contract Security Breaches and Impacts</h3>
<p>In the past, there have been several high-profile smart contract security breaches that have resulted in significant financial losses. Here are a few examples:</p>
<ol>
<li><p>The DAO Hack: In 2016, a hacker exploited a vulnerability in The DAO smart contract, which was a decentralized autonomous organization that aimed to act as a venture capital fund. The hacker managed to drain approximately $50 million worth of Ether from The DAO before the community decided to hard fork the Ethereum blockchain to reverse the hack.</p>
</li>
<li><p>Parity Wallet Bug: In 2017, a bug in the Parity Wallet smart contract resulted in the loss of approximately $150 million worth of Ether. The bug was due to a flaw in the smart contract code, which allowed a single user to become the owner of the contract and freeze all the funds held in the wallet.</p>
</li>
<li><p>YAM Finance Reentrancy Bug: In 2020, the YAM Finance DeFi protocol suffered a reentrancy bug that resulted in a loss of approximately $750,000 worth of funds. The bug allowed an attacker to continuously withdraw funds from a YAM smart contract, resulting in a loss of the majority of the protocol's total value.</p>
</li>
</ol>
<p>There have been other notable incidents, including the Bancor hack, the Parity multisig wallet bug, and the Augur smart contract vulnerability. These incidents highlight the importance of proper smart contract auditing and the potential financial risks associated with deploying untested or poorly audited smart contracts.</p>
<h3 id="heading-future-of-smart-contract-auditing">Future of Smart Contract Auditing</h3>
<p>As the use of smart contracts continues to grow, the importance of auditing will only increase. In the future, we can expect to see advancements in smart contract auditing technology, including more sophisticated automated auditing tools, increased use of AI and machine learning, and greater integration with traditional security frameworks.</p>
<p>However, there are also potential challenges and opportunities on the horizon. As the industry grows, we may see a shortage of qualified auditors and a need for greater standardization and regulation in the auditing process. Additionally, the rise of decentralized finance (DeFi) and other innovative smart contract applications may present unique auditing challenges that require new approaches and tools.</p>
<p>Overall, the future of smart contract auditing is promising, and the industry will continue to evolve to meet the growing demand for secure and reliable smart contracts. Developers and businesses should prioritize auditing as a critical component of smart contract development and deployment to ensure long-term success.</p>
]]></content:encoded></item><item><title><![CDATA[How I Found SSRF In Choreo's REST API Proxy]]></title><description><![CDATA[So one night I was looking for some external bug bounty programs. Then I found WSO2 Security Reward and Acknowledgement Program. Within the scope of the program was a product called Choreo.
So Choreo is a digital innovation platform that allows you t...]]></description><link>https://blog.d1pakda5.com/how-i-found-ssrf-in-choreos-rest-api-proxy</link><guid isPermaLink="true">https://blog.d1pakda5.com/how-i-found-ssrf-in-choreos-rest-api-proxy</guid><category><![CDATA[bugbounty]]></category><category><![CDATA[REST API]]></category><category><![CDATA[api proxy]]></category><category><![CDATA[ssrf ]]></category><category><![CDATA[Bugs and Errors]]></category><dc:creator><![CDATA[Dipak kumar Das]]></dc:creator><pubDate>Tue, 16 Aug 2022 18:47:26 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1656490946102/N8reOSPmI.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>So one night I was looking for some external bug bounty programs. Then I found <a target="_blank" href="https://docs.wso2.com/display/Security/WSO2+Security+Reward+and+Acknowledgement+Program">WSO2 Security Reward and Acknowledgement Program</a>. Within the scope of the program was a product called Choreo.</p>
<p>So Choreo is a digital innovation platform that allows you to develop, deploy, and manage cloud-native applications at scale. Its AI-assisted, low-code application development environment simplifies creating services, managing APIs, and building integrations while ensuring best practices and secure coding guidelines.</p>
<p>I started testing one functionality of Choreo called <strong>REST API Proxy</strong></p>
<p><strong>What is a REST API Proxy?</strong></p>
<blockquote>
<p>A REST API Proxy is an API proxy that complies with the Representational State Transfer(REST) standards. The REST API proxy fronts the API and is the contact point for applications that want to consume the API. Although APIs decouples the backend and the application, an API alone cannot ensure security for the backend and the application by applying policies such as security, rate-limiting, etc. This is where a REST API Proxy comes into play. A REST API Proxy helps you manage the API by applying necessary security policies, access-control policies, and even collecting analytics. Fronting your unmanaged API by a REST API proxy gives your application the flexibility to make changes to the back-end API without affecting the applications that consume them.</p>
</blockquote>
<p>A REST API Proxy exposes an endpoint that applications use to consume the API.</p>
<p>So the Choreo API Proxy functionality Works like below</p>
<ol>
<li><p>Exposing an existing API by creating a REST API proxy.</p>
</li>
<li><p>Deploying the REST API proxy.</p>
</li>
<li><p>Testing the REST API proxy to verify its functionality.</p>
</li>
<li><p>Manage your REST API proxy by adding rate limiting and security policies and leveraging the platform's API management capabilities.</p>
</li>
</ol>
<p>So lets start how I manage to find a SSRF in that functionality</p>
<p>First I created a dummy api proxy with target https://google.com , then i deployed the API and got invoke URL as below</p>
<p><code>https://c7000d34-e8b2-4669-89c7-5fb9b8b46d00-dev.e1-us-east-azure.choreoapis.dev/vjvn/defaultapi/1.0.0</code></p>
<p>From the URL structure <code>dev.e1-us-east-azure.choreoapis.dev</code> I got confirmation that the application API is hosted on Azure</p>
<p>So thought to give a try for SSRF</p>
<ol>
<li>Collected the metadata URL for azure from the <a target="_blank" href="https://gist.github.com/BuffaloWill/fa96693af67e3a3dd3fb">Cloud Metadata directory</a></li>
</ol>
<pre><code class="lang-plaintext">http://169.254.169.254/metadata/instance?api-version=2017-04-02

http://169.254.169.254/metadata/instance/network/interface/0/ipv4/ipAddress/0/publicIpAddress?api-version=2017-04-02&amp;format=text
</code></pre>
<p>Then Created a new REST API Proxy with endpoint set to <code>http://169.254.169.254/metadata/instance?api-version=2017-04-02</code></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656507369333/zH0ZEllom.png" alt="Screenshot at Jun 29 18-25-48.png" /></p>
<p>Then deployed the API , which gave me the endpoint and the authentication token</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656507674261/cAi1BH99A.png" alt="image.png" /></p>
<p>Then I started testing the API by clicking the Test button. and there is option to copy the curl request to test via curl</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656507909414/DLqzKIMFV.png" alt="image.png" /></p>
<p>Then I got response <code>Bad request: . Required metadata header not specified</code></p>
<p>This error confirmed that there is interaction with the azure , after googling the error found out that there is extra HTTP header <code>Metadata=true</code> required to access metadata.</p>
<p>So I added the header in the curl with -H flag</p>
<pre><code class="lang-bash">curl <span class="hljs-string">"https://c7000d34-e8b2-4669-89c7-5fb9b8b46d00-dev.e1-us-east-azure.choreoapis.dev/vjvn/defaultapia/1.0.0/"</span> -H <span class="hljs-string">'Metadata=true'</span> -H <span class="hljs-string">'API-Key: eyJXXXX'</span> -X GET
</code></pre>
<p>Then after setting the header the header error gone but I got another error</p>
<pre><code class="lang-json">{<span class="hljs-attr">"error"</span>:<span class="hljs-string">"Bad request. api-version is invalid or was not specified in the request. For more information refer to aka.ms/azureimds"</span>,<span class="hljs-attr">"newest-versions"</span>:[<span class="hljs-string">"2021-12-13"</span>,<span class="hljs-string">"2021-11-15"</span>,<span class="hljs-string">"2021-11-01"</span>]}
</code></pre>
<p>After lot of debugging found out that I set the endpoint as <code>http://169.254.169.254/metadata/instance?api-version=2017-04-02</code> so the whole URL is not getting passed with the request or the version I am using no longer supported . So I tried with the version <code>2021-12-13</code> still I got the same api-version error like before.</p>
<p>After scratching my head , I got one idea .</p>
<p><img src="https://media.giphy.com/media/gfkXZvaULTJcFPgfWw/giphy-downsized.gif" alt="Gif idea" /></p>
<p>To create a new REST API Proxy with Endpoint <code>http://169.254.169.254</code> and append the path <code>/metadata/instance?api-version=2017-04-02</code> in Invoke URL endpoint in the curl command.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656509338067/hegSzlnr5.png" alt="image.png" /></p>
<p>Then deployed the API , opened the testing console via curl and set the path to <code>/metadata/instance</code> and added one parameter <code>api-version</code> with value <code>2017-04-02</code></p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656509812636/JY7qxD7dC.png" alt="image.png" /></p>
<p>Then copied the Curl command and added the extra HTTP header <code>Metadata=true</code></p>
<pre><code class="lang-bash">
curl <span class="hljs-string">"https://f61db5e1-4378-4746-bdc8-4b00a65701b5-dev.e1-us-east-azure.choreoapis.dev/ujfn/defaultapiadghdg/1.0.0/metadata/instance?api-version=2017-04-02"</span> -H <span class="hljs-string">'Metadata: true'</span> -H <span class="hljs-string">'API-Key: eyJrXXXXX'</span> -X GET
</code></pre>
<p>And guess what it's worked like a charm and got the metadata</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656510376451/nvITMQr6Q.png" alt="image(4)(1).png" /></p>
<p>After this stopped further testing and quickly created the POC and reported to the vendor.</p>
<p>WSO2 Team fixed the issue within a day . I got a bounty, certificate and got acknowledged in their <a target="_blank" href="https://docs.wso2.com/display/Security/Acknowledgments">acknowledgement</a> page.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1660668435841/ilipYJ1WI.png" alt="Screenshot at Aug 16 22-15-29.png" /></p>
<p>Thanks for visiting . Subscribe to my newsletter and never miss my upcoming articles.</p>
]]></content:encoded></item><item><title><![CDATA[Mylabs COVID-19 Antigen Test Can Cost You Your PII Data]]></title><description><![CDATA[So 2 weeks ago I am having cough and cold and I am about to get vaccinated. So I though to get COVID tested before vaccination. Then I got to know that there is a covid-19 antigen test kit available by mylabdiscoverysolutions. Which provides an mobil...]]></description><link>https://blog.d1pakda5.com/mylabs-covid-19-antigen-test-can-cost-you-your-pii-data</link><guid isPermaLink="true">https://blog.d1pakda5.com/mylabs-covid-19-antigen-test-can-cost-you-your-pii-data</guid><dc:creator><![CDATA[Dipak kumar Das]]></dc:creator><pubDate>Thu, 17 Jun 2021 21:16:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1656406524496/8qFsp5JQQ.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>So 2 weeks ago I am having cough and cold and I am about to get vaccinated. So I though to get COVID tested before vaccination. Then I got to know that there is a covid-19 antigen test kit available by <a target="_blank" href="https://mylabdiscoverysolutions.com/">mylabdiscoverysolutions</a>. Which provides an mobile app based antigen self-test kit. I got the kit from Flipkart and did my test and luckily got negative.</p>
<p>Endpoint holds  data so disclosing the issue partially with redacted information.  </p>
<p>So lets start,  </p>
<p>The app provides a functionality where you have to create one account in <a target="_blank" href="https://play.google.com/store/apps/details?id=netsurf.mylab.coviself">Mylab Coviself</a>  mobile app and you can save and share your test result.</p>
<p><a target="_blank" href="https://1.bp.blogspot.com/-wi0iZv_N1kU/YMuw3kmlIZI/AAAAAAAAZoo/MnyrX73uTQAdSKBUViOJrw0oADTiD4LuQCLcBGAsYHQ/s1626/cov.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363271443/AK7agdPge.png" alt /></a></p>
<p>Under Reports section there is section called View Report</p>
<p><a target="_blank" href="https://1.bp.blogspot.com/-qcQ-uoKxcYo/YMu7fuKbKaI/AAAAAAAAZpc/ojnxY33TTkU9PWhK8qOfa3SjTxY-krbQgCLcBGAsYHQ/s928/cov11.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363273053/nvsaKfECh.png" alt /></a></p>
<p> When I clicked the View Report one API called made to https://xxx.xxx.com/  with a parameter called patient_test_id</p>
<p>Where its displays the user's Name, address, age, phone number and the covid test result and user can down the report as pdf</p>
<p><a target="_blank" href="https://1.bp.blogspot.com/-kQUTX9TFRZo/YMuyWr60rOI/AAAAAAAAZow/k5knbCEbpu4ofpyn1YoptbRy6cudnc9EACLcBGAsYHQ/s1562/cov2.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363274670/qy-jaYPcC.png" alt /></a></p>
<p>So the patient_test_id parameter is vulnerable to IDOR , by replacing the value of patient_test_id I am able to see any user's data which includes name,address,age,Mobile number,gender, email(few email getting disclosed as it's a optional field  during signup) and the COVID test result. Below are few result with redacted information</p>
<p><a target="_blank" href="https://1.bp.blogspot.com/-oHeklqfFFf8/YMu4U1WM3xI/AAAAAAAAZo8/Irn8wSxSUU0dSJNm9JSDi0vKvVzKoQ5VQCLcBGAsYHQ/s1776/cov5.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363276974/BqF5SeImk.png" alt /></a> <a target="_blank" href="https://1.bp.blogspot.com/-bvs9R5AMtaU/YMu4NPR2X6I/AAAAAAAAZo4/edxCkrb17hoNYlZbWr-4H4TbpEA3syWzACLcBGAsYHQ/s1756/cov4.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363278828/4f_Os4tdo.png" alt /></a></p>
<p>The attack is pretty straight forward by using burp suit intruder attacker can extract all user information   </p>
<p>Till today (18th June) 40694 user done the antigen test and all information are publicly accessible.</p>
]]></content:encoded></item><item><title><![CDATA[Buying A Gift Can Cost You Your PII Data]]></title><description><![CDATA[Almost 1 year ago I reported one PII Data leak to Winni Bug Bounty Program.  

After 20+ follow up mail I am disclosing  the issue though Winni  team fixed the issue silently without responding back.  

So the issue is a pretty straight forward  IDOR...]]></description><link>https://blog.d1pakda5.com/buying-a-gift-can-cost-you-your-pii-data</link><guid isPermaLink="true">https://blog.d1pakda5.com/buying-a-gift-can-cost-you-your-pii-data</guid><dc:creator><![CDATA[Dipak kumar Das]]></dc:creator><pubDate>Tue, 02 Jun 2020 20:45:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1656406894647/ird8ioIpH.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Almost 1 year ago I reported one <strong>PII Data leak</strong> to <a target="_blank" href="https://www.winni.in/bug-bounty">Winni Bug Bounty Program.</a>  </p>
<p><a target="_blank" href="https://1.bp.blogspot.com/-OdfveK88MKE/Xta3mTfY9WI/AAAAAAAAVus/KSGY9iRZxdoK4ONy58gg2WJ5qbM3MEN1ACLcBGAsYHQ/s1600/Screenshot_195.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363287589/UYkRp1uxa.png" alt /></a></p>
<p>After 20+ follow up mail I am disclosing  the issue though <a target="_blank" href="https://www.winni.in/">Winni</a>  team fixed the issue silently without responding back.  </p>
<p><a target="_blank" href="https://aniportalimages.s3.amazonaws.com/media/details/Winni_Logo_Square_rwUpPrm.jpg"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363289777/2RS5LbXpZ.jpeg" alt /></a></p>
<p>So the issue is a pretty straight forward  <a target="_blank" href="https://portswigger.net/web-security/access-control/idor">IDOR</a>   </p>
<p> Winni delivers cake and gift to your loved one , while placing the order before payment its ask for the address.  </p>
<p>While selecting the address one POST request made to fetch the address in reference to  addressId.  </p>
<pre><code class="lang-http">

<span class="apache">    <span class="hljs-attribute">POST</span> /checkout/adv/address/select-previous HTTP/<span class="hljs-number">1</span>.<span class="hljs-number">1</span>
    <span class="hljs-attribute">Host</span>: winni.in
    <span class="hljs-attribute">User</span>-Agent: Mozilla/<span class="hljs-number">5</span>.<span class="hljs-number">0</span> (Windows NT <span class="hljs-number">10</span>.<span class="hljs-number">0</span>; Win<span class="hljs-number">64</span>; x<span class="hljs-number">64</span>; rv:<span class="hljs-number">77</span>.<span class="hljs-number">0</span>) Gecko/<span class="hljs-number">20100101</span>   
    <span class="hljs-attribute">Accept</span>: application/json, text/javascript, */*; q=<span class="hljs-number">0</span>.<span class="hljs-number">01</span>
    <span class="hljs-attribute">Accept</span>-Language: en-US,en;q=<span class="hljs-number">0</span>.<span class="hljs-number">5</span>
    <span class="hljs-attribute">Accept</span>-Encoding: gzip, deflate
    <span class="hljs-attribute">Content</span>-Type: application/x-www-form-urlencoded; charset=UTF-<span class="hljs-number">8</span>
    <span class="hljs-attribute">X</span>-Requested-With: XMLHttpRequest
    <span class="hljs-attribute">Content</span>-Length: <span class="hljs-number">16</span>
    <span class="hljs-attribute">Origin</span>: winni.in
    <span class="hljs-attribute">Connection</span>: close
    <span class="hljs-attribute">Referer</span>: winni.in/checkout/adv/address
    <span class="hljs-attribute">Cookie</span>: AWSALBTG=XXX

    <span class="hljs-attribute">addressId</span>=<span class="hljs-number">685945</span></span>
</code></pre>
<p>Alter the addressid value to fetch other user's address along with name and phone number.  </p>
<p>As the addressId is sequential an attacker can fetch all address available in the database . Which will result mass PII leaks including data such as names, phone numbers and addresses.  </p>
<p><strong>POC</strong>  </p>
<iframe height="315" src="https://www.youtube.com/embed/Zj26LSPsf1U" width="560"></iframe>  

<p>PS- Don't waste your time by reporting their bug bounty program.   </p>
<p>Thanks for reading, any suggestion feedback are welcome</p>
]]></content:encoded></item><item><title><![CDATA[From Github Recon To Account Takeover]]></title><description><![CDATA[Hi everyone , after a long time I am doing a write-up on GitHub recon which leads to full account takeover . Few days ago I got a private invite where the in-scope target is only the mobile app.
As its a private program we will take it as Example App...]]></description><link>https://blog.d1pakda5.com/from-github-recon-to-account-takeover</link><guid isPermaLink="true">https://blog.d1pakda5.com/from-github-recon-to-account-takeover</guid><dc:creator><![CDATA[Dipak kumar Das]]></dc:creator><pubDate>Sat, 24 Aug 2019 19:24:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1656409067121/VwejWOGgu.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hi everyone , after a long time I am doing a write-up on GitHub recon which leads to full account takeover . Few days ago I got a private invite where the in-scope target is only the mobile app.</p>
<p>As its a private program we will take it as Example App . So I gone through all endpoint and functionality of the  application , i didn't find anything critical. So I thought to give a try to their GitHub.</p>
<p>If you want to learn how to do GitHub recon there is a detailed <a target="_blank" href="https://www.youtube.com/watch?v=l0YsEk_59fQ">tutorial</a> by <a target="_blank" href="https://twitter.com/Th3G3nt3lman">Th3G3nt3lman</a></p>
<p>So i started my search with the keyword <strong>passwd</strong> , i got 3-5 result</p>
<p>after going through all file i got a valid password in file called config.properties</p>
<p><a target="_blank" href="https://1.bp.blogspot.com/-CPiNyWG-v0g/XWGBNdmMLII/AAAAAAAARTQ/EGn9v9_8BZYUjKdOdwS0yLyy7YBdWRyaACLcBGAs/s1600/Screenshot_145.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363298632/UGSDWqd-9.png" alt /></a></p>
<p>So that app using OTP based authentication and i got the credential for the third party service , which they are using for the SMS.</p>
<p>Using those credential I logged into the SMS provider portal , there is a section call SMS delivery where all SMS delivery report are  stored along with the Phone number and the text sent to that number.</p>
<p><a target="_blank" href="https://1.bp.blogspot.com/-XJKnOhR9pOQ/XWLI-9i78pI/AAAAAAAARVI/SuCJZwnEAw0qmGpB9GyB5JaeJ4EljgPewCLcBGAs/s1600/6wPYotSY.png%2Blarge.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363300094/UQGAAq8Yv.png" alt /></a></p>
<p>So now i have all registered users mobile number and OTP delivery report along with OTP</p>
<p>So i just request for OTP and from the delivery report got the valid OTP and loggedin to any user's account 😎</p>
<p><a target="_blank" href="https://media.giphy.com/media/iNqNlmBrb7iQ4gsmVo/giphy.gif"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363302247/e4bYd1vJ7.gif" alt /></a></p>
<p>Hope you guys like it , share your feedback in comment.</p>
]]></content:encoded></item><item><title><![CDATA[How I Was Able To Takeover All User Account And Admin Panel]]></title><description><![CDATA[Hi everyone, This is my last write-up of 2018, so 6 months ago I got the invite from a Hackerone private program, the program has a huge scope, so currently I am focused on that single program. Found a subdomain let say abc.example.com (As it a priva...]]></description><link>https://blog.d1pakda5.com/how-i-was-able-to-takeover-all-user-account-and-admin-panel</link><guid isPermaLink="true">https://blog.d1pakda5.com/how-i-was-able-to-takeover-all-user-account-and-admin-panel</guid><dc:creator><![CDATA[Dipak kumar Das]]></dc:creator><pubDate>Fri, 28 Dec 2018 07:50:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1656432867832/K7nuRjXIz.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hi everyone, This is my last write-up of 2018, so 6 months ago I got the invite from a Hackerone private program, the program has a huge scope, so currently I am focused on that single program. Found a subdomain let say abc.example.com (As it a private program so we will be using example.com instead of the original domain)  </p>
<p>So let's start  </p>
<p>The vulnerability was a pretty straightforward <a target="_blank" href="https://www.owasp.org/index.php/Insecure_Direct_Object_Reference_Prevention_Cheat_Sheet">IDOR</a>  </p>
<p>So, the website uses sso for authentication, after successful authentication its redirect back the subdomain abc.example.com  </p>
<p>after exploring the functionality, I found its a very basic site where no option to edit your own account even, many static pages and some third party links.  </p>
<p>so after that, I navigate to the https://abc.example.com/robots.txt and found lots of hidden directories are there, like /admin, /user  </p>
<p><a target="_blank" href="https://3.bp.blogspot.com/-tF5Jl0zibHM/XCXQG7o_kcI/AAAAAAAALcA/OZ-fJtE6cegdTbikO2hPT6LjRihdxRGIwCLcBGAs/s1600/Screenshot_9.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363311660/uBBHsEkV3.png" alt /></a></p>
<p>so quickly I navigate to the directory /user  it redirected me to https://abc.example.com/user/16397/edit<br />that page provides functionality like change password, change email id, change address, add an address<br />Next, I just change the value to 16390, then it's redirected me to the user edit option of  the user which associated with 16390 userid  </p>
<p>Then I created another test account to verify the issue, I am successfully able to change password and email of the user  </p>
<p><a target="_blank" href="https://3.bp.blogspot.com/-M5lApJHbAyM/XCXSOpE1r2I/AAAAAAAALcM/DOVDtkCDMlMwyosEPW1r6D-T72iDYpYuACLcBGAs/s1600/Screenshot_10.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363313212/pVEhcXoxT.png" alt /></a></p>
<p>Then I thought to give a try for admin panel takeover, so iIvisited to https://abc.example.com/user/1/edit  </p>
<p>its redirected to me to the portal admin panel where i can change admin password email  </p>
<p><a target="_blank" href="https://1.bp.blogspot.com/-UWqTkZ-ORdE/XCXTCd-7ETI/AAAAAAAALcU/VoXpYq2EoYIVtuoWMFoxjHOwMT6BJvlaACLcBGAs/s1600/Screenshot_11.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363314852/lCbLqCATv.png" alt /></a></p>
<p>So at that point ,i can able to takeover all user account by changing the userid value as all are sequential and admin panel too .  </p>
<p><a target="_blank" href="https://media.giphy.com/media/26AHszU183LU0wa6A/giphy.gif"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363316297/OLWGePXDK.gif" alt /></a></p>
<p>After 4 days they fixed the issue and got a nice bounty and bonus , that helped me to fullfill my last 2018 goal.  </p>
<p><a target="_blank" href="https://1.bp.blogspot.com/-OGUVGmiLdnc/XCXUr7wkaiI/AAAAAAAALcg/ypVMOo27jYIi-X8t1DbEn-AbRMHSXe1FACLcBGAs/s1600/Screenshot_12.png"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363318206/oqgFLI-if.png" alt /></a></p>
<p>Thanks for reading, any suggestion feedback are welcome</p>
]]></content:encoded></item><item><title><![CDATA[A Tale Of Two Simple Account Takeover]]></title><description><![CDATA[Hi everyone, so a few months ago I got the invite from a Hackerone private program, the program has huge scope. So I started my recon process. Found a subdomain let say test.example.com (As it a private program so we will be using example.com instead...]]></description><link>https://blog.d1pakda5.com/a-tale-of-two-simple-account-takeover</link><guid isPermaLink="true">https://blog.d1pakda5.com/a-tale-of-two-simple-account-takeover</guid><dc:creator><![CDATA[Dipak kumar Das]]></dc:creator><pubDate>Mon, 27 Aug 2018 09:32:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1656433244557/Q8K7y__5K.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hi everyone, so a few months ago I got the invite from a Hackerone private program, the program has huge scope. So I started my recon process. Found a subdomain let say test.example.com (As it a private program so we will be using example.com instead of the original domain)  </p>
<p>I found 2 account takeover on the same subdomain using 2 different endpoint  </p>
<ul>
<li><p><strong>Account Takeover Using Password Reset Functionality</strong> </p>
</li>
<li><p><strong>Account Takeover Using Privilege Escalation  And IDOR</strong> </p>
<p>So let's start  </p>
</li>
</ul>
<h2 id="heading-account-takeover-using-password-reset-functionality"><strong>Account Takeover Using Password Reset Functionality</strong></h2>
<p>So basically user initiated a password reset<br />after that, the password reset token looks like below  </p>
<p><code>https://test.example.com/Admin/NewUser.aspx?id=ZABlAGUAcABhAGsAZABhAHMAMgA4ADgAQABnAG0AYQBpAGwALgBjAG8AbQA=</code>  </p>
<p>so as you can see the id parameter value is base64 encoded<br />so I decoded the id parameter value and I got  d e e p a k d a s 2 8 8 @ g m a i l . c o m  </p>
<p><a target="_blank" href="https://media1.giphy.com/media/26AHszU183LU0wa6A/giphy.gif"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363327189/lpQunH0ZY.gif" alt /></a></p>
<p>so the id parameter was endcode with user email with one white space in between every character, so got the account takeover, validate the same with another email its worked like a charm  </p>
<h2 id="heading-account-takeover-using-privilege-escalation-and-idor"> <strong>Account Takeover Using Privilege Escalation  And IDOR</strong> </h2>
<p> After the first issue resolved again I dig the subdomain for more critical issue </p>
<p>so as you can see there one directory called admin so I started directory brute forcing  </p>
<p>I found one file called /admin/abmhcpuser.aspx  with 200 OK status code  </p>
<p>by browsing the URL I got this  </p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363329098/CduME_Svc.png" alt /></p>
<p>I was expecting to get the whole user but I saw there I can edit my own profile only 😥😥  </p>
<p>so I decided to check the edit functionality for IDOR<br />So I changed the parameter value to my test account email and provided a new password in password parameter and forwarded the request, got 200 OK  </p>
<p>edited my own profile captured the request found 2 parameter <strong><code>$wHCPUser$txtMedicEmail=</code></strong> and  </p>
<p><strong><code>`$wHCPUser$txtUserName=` </code></strong> the value was user email id, by default, the username set by the application was the user email id which you can't change<br />So I changed the parameter value to my test account email and provided a new password in password parameter and forwarded the request, got 200 OK<br />tried with the new password to login to my test account and I  successfully logged in, I was like  </p>
<p><a target="_blank" href="https://media2.giphy.com/media/UmwJOxZWCvV96/giphy.gif"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363330715/8UmuVf2c0.gif" alt /></a></p>
<p>Got some good bounty  and bonus<br />Thanks for reading, any suggestion feedback are welcome  </p>
<p>#s3gt_translate_tooltip_mini { display: none !important; }</p>
]]></content:encoded></item><item><title><![CDATA[Buffer Authentication Bypass]]></title><description><![CDATA[Hi everyone , here is one of my finding on Buffer.com . Where i managed to bypass the authentication  
So basically the authentication  work flow is like below  

To change account email user need to provide the current account password 
If the passw...]]></description><link>https://blog.d1pakda5.com/buffer-authentication-bypass</link><guid isPermaLink="true">https://blog.d1pakda5.com/buffer-authentication-bypass</guid><dc:creator><![CDATA[Dipak kumar Das]]></dc:creator><pubDate>Sun, 20 Aug 2017 11:45:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1656433431032/RERaRp6pQ.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hi everyone , here is one of my finding on Buffer.com . Where i managed to bypass the authentication  </p>
<p>So basically the authentication  work flow is like below  </p>
<ul>
<li>To change account email user need to provide the current account password </li>
<li>If the password is correct then application let you to change the account email </li>
</ul>
<p>So lets start  </p>
<p>when user want to change their account email id the app ask for current password  like below  </p>
<p><img alt />  </p>
<p>so here i wanted to test the response for both correct and incorrect password response  </p>
<p>so here is the request  </p>
<p><em>*POST /account/set-sudomode HTTP/1.1 200 OK<br />Date: \</em>*****<br />Host:buffer.com<br />User-Agent: Mozila/5.0<br />X-Request-With: XMLHttpRequest  </p>
<p>csrf_token=uyr37832rhehr8&amp;password=wrongpassword**  </p>
<p>so the response for wrong password is below  </p>
<p><em>*HTTP/1.1 200 OK<br />Date: Mon,\</em>****<br />Content-Lenght: 139<br />Connection:close  </p>
<p>{"error_message":"Huh That's not your current password,are you sure you got that right?","csrf_token":"uyr37832rhehr8"}**   </p>
<p>so here is the response for correct password  </p>
<p> <em>*HTTP/1.1 200 OK<br />Date: Mon,\</em>****<br />Content-Lenght: 139<br />Connection:close  </p>
<p>{"notice_message":"Great, we believe it's really you","sudomode":"true","csrf_token":"Csrftoken"}**  </p>
<p><strong>if you observe both response just the notice_message and sudomode added in the correct password response</strong><br /><strong>so here i used a wrong password let say 123456</strong>  </p>
<p><strong>Request is like below</strong><br /><em>*POST /account/set-sudomode HTTP/1.1 200 OK<br />Date: \</em>*****<br />Host:buffer.com<br />User-Agent: Mozila/5.0<br />X-Request-With: XMLHttpRequest  </p>
<p>csrf_token=uyr37832rhehr8he7372829hefdgdf&amp;password=123456**  </p>
<p><strong>Note the csrf _token value in the request that is :</strong><br /><strong>uyr37832rhehr8he7372829hefdgdf</strong>  </p>
<p><strong>Response</strong>    </p>
<p><em>*HTTP/1.1 200 OK<br />Date: Mon,\</em>****<br />Content-Lenght: 139<br />Connection:close  </p>
<p>{"error_message":"Huh That's not your current password,are you sure you got that right?","csrf_token":"<strong>**</strong>uyr37832rhehr8he7372829hefdgdf<strong>"}</strong>   </p>
<p><strong>Modify the response to</strong><br /><a target="_blank" href="https://www.blogger.com/null"></a><em>*HTTP/1.1 200 OK<br />Date: Mon,\</em>****<br />Content-Lenght: 139<br />Connection:close  </p>
<p>{"notice_message":"Great, we believe it's really you","sudome":"true","csrf_token":"<strong><em>**</em></strong>uyr37832rhehr8he7372829hefdgdf<strong>**"}</strong><br />Boom now it will show successfully authenticated and you can change your email<br />So here is the video proof of concept  </p>
<p><a target="_blank" href="https://www.blogger.com/null"></a><a target="_blank" href="https://www.blogger.com/null"></a><iframe height="315" src="https://www.youtube.com/embed/Bcc3kE1bsyU" width="560"></iframe>  </p>
<p> <a target="_blank" href="https://www.blogger.com/null"></a> <a target="_blank" href="https://www.blogger.com/null"></a> <a target="_blank" href="https://www.blogger.com/null"></a>Status: Fixed<br />Bounty Rewarded</p>
]]></content:encoded></item><item><title><![CDATA[Account Takeover Via Password Reset Functionality]]></title><description><![CDATA[Hi everyone , here is one of my write-up on account takeover via password reset functionality . As the site is private let assume as site.com  
So basically the password reset functionality work flow is like below  

User requested for password reset...]]></description><link>https://blog.d1pakda5.com/account-takeover-via-password-reset-functionality</link><guid isPermaLink="true">https://blog.d1pakda5.com/account-takeover-via-password-reset-functionality</guid><dc:creator><![CDATA[Dipak kumar Das]]></dc:creator><pubDate>Sat, 12 Aug 2017 11:38:00 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1656440262955/_1E7592ut.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hi everyone , here is one of my write-up on account takeover via password reset functionality . As the site is private let assume as <strong>site.com</strong>  </p>
<p>So basically the password reset functionality work flow is like below  </p>
<ul>
<li><strong>User requested for password reset</strong></li>
<li><strong>Then one code(12 digit Alphanumeric ) sent to the registered Email id</strong></li>
<li><strong>User have to provide the correct code then  application ask to set new password</strong> </li>
</ul>
<p>So lets start  </p>
<p>to reset password user need to visit https://site.com/forgetpassword  </p>
<p>the below form will appear ,  </p>
<p> <strong><img alt /></strong></p>
<p>So here let say we use victim email id victim@site.com  and requested for password reset  </p>
<p>after that the below screen will appear , here we need to enter the correct code to reset the password . so the code is 12 digit so no way to brute force.  </p>
<p> <strong><img alt /></strong></p>
<p>so here used some random code like "hacker"  and i saw there is no validation of code length  </p>
<p>so here is the request of code validation<br />_POST /memberp/users/send_reser_instruction<br />Content-Lenght: 67<br />Content-Type: application/x-www-form-urlencoded<br />Host: site.com<br />Connection: close<br />User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:50.0) Gecko/20100101 Firefox/50.0<br />X-Request-With: XMLHttpRequest<br />Referer: http://site.com/forgotpassword<br />Cookie: bla=bla;<em>  
</em>_method=POST&amp;data%5Bforgotpassword%5D%5Bpassword+Reset+code%5D=hacker&amp;data%5Bforgotpassword%5D%5Bprcemailid%5D=UkRNS2JSUlZWcEdjdmNnRE1JOWVhuXFVMWpEMWMOREZHWExaaHRGaWdyWT0==_  </p>
<p>here is the response   </p>
<p>_HTTP/1.1 200 OK<br />Date: sun,08 may 2017 10:58:07 GTM<br />Server: Apache<br />Connection: Close<br />Content-Type: text/html; charset=UTF-8  </p>
<p></p><div class="Loginerror low\_margin">The Password reset code entered by you is either invalid or has expired.</div>_  <p></p>
<p>so after that i have provided the correct code to analysis the back-end validation  </p>
<p>so for a correct code in the response body just changed like this  </p>
<p><em>HTTP/1.1 200 OK<br />Date: sun,08 may 2017 10:58:07 GTM<br />Server: Apache<br />Connection: Close<br />Content-Type: text/html; charset=UTF-8</em><br /><em>Content-length:  210</em><br /><em></em><br />so as you can see it just validating the <em><strong>prcemailid2</strong></em> value which we can get from the 1st request  </p>
<p><strong>_method=POST&amp;data%5Bforgotpassword%5D%5Bpassword+Reset+code%5D=hacker&amp;data%5Bforgotpassword%5D%5Bprcemailid%5D=UkRNS2JSUlZWcEdjdmNnRE1JOWVhuXFVMWpEMWMOREZHWExaaHR</strong>  </p>
<p> <strong>so just in the response body you need to replace with below code</strong>   </p>
<p><strong><strong>   
</strong>so the final response will be like this**   </strong></p>
<p><em>HTTP/1.1 200 OK<br />Date: sun,08 may 2017 10:58:07 GTM<br />Server: Apache<br />Connection: Close<br />Content-Type: text/html; charset=UTF-8</em><br /><em>Content-length:  210</em><br />__  </p>
<p><em>boom now the below screen appears</em>   </p>
<p><em><img alt /></em></p>
<p>Now provide the new password and confirm new password and submit the request , password changed successfully . Navigate to login panel and login with new password .  </p>
<p><a target="_blank" href="https://media.makeameme.org/created/password-resets-password.jpg"><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1656363355424/SBOtSrkBH.jpeg" alt /></a></p>
<p> successfully own the account  </p>
<p><strong>Status :Fixed</strong><br /><strong>Bounty Rewarded</strong></p>
]]></content:encoded></item></channel></rss>