mobile-verification

1 article
sort: new top best
clear filter
0 6/10

Educational writeup demonstrating multiple 2FA bypass techniques including SMS OTP redirection via parameter manipulation, token reuse attacks, lack of rate limiting on OTP verification, and expired confirmation token exploitation. Includes case studies from HackerOne and bug bounty programs.

Gaurav Narwani HackerOne Google Facebook Skype Grab login.gov
gauravnarwani.com · devanshbatham/Awesome-Bugbounty-Writeups · 22 hours ago · details