When Rate Limiting Fails Silently: Turning OTP Abuse into Account Takeover
文章描述了一次因OTP(一次性密码)过度发送引发的安全漏洞事件。攻击者利用应用程序中缺失或失效的速率限制机制,通过网络缓存中毒、大规模信息收集和敏感端点滥用等手段,最终实现了账户接管。 2025-12-25 14:23:28 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Iski

Free Link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by AI

Life lesson #1:
You can forget your phone at home.
You can forget your wallet.
But the one thing modern apps
never forget?
Sending OTPs… again… and again… and again. 😌📩

That was my first red flag.

Because whenever an application is too generous with OTPs, it usually means rate limiting is either missing, broken, or pretending to exist — like a security guard who sleeps with his eyes open.

And this story?
This is how a “harmless OTP feature” quietly snowballed into a full Account Takeover, with a spicy detour through web cache poisoning, mass recon, and sensitive endpoint abuse.

Buckle up 🔥

🧠 Phase 1: Mass Recon — When Boredom Meets Curiosity

Like any unhealthy relationship, this started with recon.


文章来源: https://infosecwriteups.com/when-rate-limiting-fails-silently-turning-otp-abuse-into-account-takeover-a46c30b8c80c?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh