2.11 Lab: Password reset poisoning via middleware | 2024

This lab is vulnerable to password reset poisoning. The user carlos will carelessly click on any links in emails that he receives. To solve the lab, log in to Carlos’s account. You can log in to your own account using the following credentials: wiener:peter. Any emails sent to this account can be read via the email client on the exploit server | Karthikeyan Nagaraj

Karthikeyan Nagaraj
2 min readJan 9, 2024

Description

This lab is vulnerable to password reset poisoning. The user carlos will carelessly click on any links in emails that he receives. To solve the lab, log in to Carlos's account. You can log in to your own account using the following credentials: wiener:peter. Any emails sent to this account can be read via the email client on the exploit server.

Solution

  1. Go to My Account, Click Forgot Password, and type the username wiener
  2. Now Click on the Exploit Server and click Email Client at the Bottom
  3. Note down the URL
  4. Now Again, go to My Account, Click Forgot-Password type the username of Carlos, and Capture the request using Burpsuite
  5. Send the Request to Repeater and turn off the Intercept
  6. In Repeater, Add a Header at the end of the request called X-Forwarded-Host: YOUR-EXPLOIT-SERVER-ID.exploit-server.net
  7. Make sure that the value of the username is carlos, remove the value of the session cookie if needed, and send the request
  8. Go to Exploit Server, Click Access Log and you can able to see the Password reset token of Carlos that was sent by us. If you have sent the request multiple times then use the Latest token with the Help of time.
  9. Copy the token and paste it in the URL that we received for wiener and paste it on the browser
  10. Change the password, click My-Account, and Log in with the username carlos and the password you changed. And the lab will be solved.

--

--

Karthikeyan Nagaraj

Entrepreneur | Writer | Cyber Security Consultant | AI Researcher