2FA-Bypass
1:- Password Reset Disable 2FA
2:- No Rate limit
3:- Sending all alphabets instead of number
4:- Status Code Manipulation
5:- 2FA bypass by substituting part of the request from the session of another account.
6:- Bypass 2FA using the “memorization” functionality.
Many sites that support 2FA, have a “remember me” functionality. It is useful when the user doesn’t want to enter a 2FA code on subsequent login windows. And it is important to identify the way in which 2FA is “remembered”. This can be a cookie, a value in session/local storage, or simply attaching 2FA to an IP address.
7:- OTP Leakage in Response
8:- Bypassing 2fa Via OAuth mechanism ( Mostly not Applicable one )
Site.com requests Facebook for OAuth token > Facebook verifies user account > Facebook send callback code > Site.com logs a user in (Rare case)
9:- Bypassing 2fa using response manipulation
10:- CSRF on 2FA Disable Feature.
11:- Bypass 2FA by Adding null or 000000
12:- Bypass 2FA by Batch API request
https://twitter.com/FaniMalikHack/status/1395042756108505092
https://twitter.com/FaniMalikHack/status/1402627994833805313
Twitte :- Fani Malik
Last updated