zoukankan      html  css  js  c++  java
  • MetInfo Password Reset Poisoning By Host Header Attack

    if we know some user's email, the we will can reset the user's email by host header attack.

    The attack vector is that the user binded email and we know the user's email.

    The following POST request is the normal request.

    as the picture shows,the request host header is Localhost.

    so the reset password email is like this:

    but this link'host comes from the reset passowrd request host header.If we change the reset passowrd request host header, then the reset passowrd link in email will changes.

    so if a attacker konw some user's email and change the host header of the reset passowrd request. when the user click the fake reset password link, the attacker will receive this request, then change the link with the true host, finally change the user's password.

    1. change the host header of the reset passowrd request

    1. the user will receive the reset password email like this

    1. the user click the fake reset password link.

    2. the attacker will receive this request.

    1. then the attacker change this request with the true host(the website's host), and visit the link to change the user's password.

  • 相关阅读:
    hbase
    pig
    flume
    sqoop
    eclipse 提交作业到JobTracker Hadoop的数据类型要求必须实现Writable接口
    hadoop 8步走
    ssh原理
    MapReduce基础
    Arduino数字贴片磁感应传感器(收藏篇)
    去掉input回车自动提交
  • 原文地址:https://www.cnblogs.com/babers/p/8503116.html
Copyright © 2011-2022 走看看