Response Manipulation leads to Account Takeover

MikeChan
3 min readMar 6, 2022
Photo by olieman.eth on Unsplash

This is a short story about my recent bug hunting on a private program. This program mainly relies on OTP to check user’s authentication. This story would walk through how I bypass its OTP check using response manipulation. So, let’s begin.

If you are not yet a medium member, please subscribe using the link below.

--

--

MikeChan

Cybersecurity, Part-time bug bounty hunter. Support me by subscribe: https://mikekitckchan.medium.com/membership. Ping me for online private tutoring.