paypal hack released february 2014 - hack ganar dinero paypal

paypal hack released february 2014 – hack ganar dinero paypal






manually hack paypal html – hack de cuenta paypal – paypal hack linkToday I am going to publicly disclose a critical vulnerability I have found during my research in PayPal, This vulnerability enabled me to completely bypass the CSRF Prevention System implemented by PayPal, The vulnerability is patched very fast and PayPal paid me the maximum bounty they give ;).**1- Reusable CSRF Token:*The CSRF token “that authenticate every single request made by the user” which can be also found in the request body of every request with the parameter name “Auth” get changed with every request made by user for security measures, but after a deep investigation I found out that the CSRF Auth is Reusable for that specific user email address or username, this means If an attacker found any of these CSRF Tokens, He can then make actions in the behalf of any logged in user.*Hmm, it seems interesting but still not exploitable, as there is no way for an attacker to get the “Auth” value from a victim session.**2- Bypassing the CSRF Auth System:*The CSRF Auth verifies every single request of that user, So what If an attacker “not logged in” tries to make a “send money” request then PayPal will ask the attacker to provide his email and password, The attacker will provide the “Victim Email” and ANY password, Then he will capture the request, The request will contain a Valid CSRF Auth token Which is Reusable and Can authorise this specific user requests. Upon Further Investigation, We have found out that an Attacker can obtain the CSRF Auth which can be valid for ALL users, by intercepting the POST request from a page that provide an Auth Token before the Logging-in process, check this page for the magical CSRF Auth “ At this point the attacker Can CSRF “almost” any request on behalf of this user.*Through examination of the password change process, I have found that an attacker can NOT Change the victim password without answering the Security Questions set by user, Also the user himself can NOT change the security questions without entering the password!**3- ByPassing the Security Questions Change:*Screen Shot 2014-08-13 at 12.20.52 AM*The initial process of “setting” security questions is not password protected and is reusable*After further investigation, I have noticed that the request of setting up the security questions “which is initiated by the user while signing up” is not password-protected, and it can be reused to reset the security questions up without providing the password, hence, Armed with the CSRF Auth, an attacker can CSRF this process too and change the victim’s Security questions.**At this point, An attacker can conduct a targeted CSRF attack against PayPal users and take a full control over their accounts. Hence, An attacker can CSRF all the requests including but not limited to:**1- Add/Remove/Confirm Email address*2-Add fully privileged users to business account*3- Change Security questions*4- Change Billing/Shipping Address*5- Change Payment methods*6- Change user settings(Notifications/Mobile settings) ………… and more.*To automate the whole process, I have coded a Python interactive server to demonstrate how an attacker can exploit this vulnerability in a real-life scenario attack.What is the Annual Percentage Rate (APR)?**The Annual Percentage Rate for standard purchases and cash advances on a PayPal Credit line is 19.99%, although some special offers have a lower, promotional APR. The Minimum Interest Charge is $2.00. Of course, you can choose to pay your entire balance by the payment due date to avoid interest charges.*What does ‘Subject to Credit Approval’ mean?**PayPal Credit is a credit account that you can use to make purchases and send money. Comenity Capital Bank will review and consider your credit report and other credit related information prior to opening your account and establishing your credit line. Creditworthiness is determined by Comenity Capital Bank. This process happens in a matter of seconds as part of the PayPal Credit checkout process. Once you are a PayPal Credit customer, you can use your credit line to make purchases. If you make a purchase that would cause your outstanding balance to go above your credit line, we will review your credit history and history with PayPal Credit to instantly determine whether to increase your credit line.*Do you check my credit report every time I make a purchase?**No. A credit report is reviewed when you apply for PayPal Credit and occasionally when you attempt to increase your credit line. Periodically, we’ll obtain updates of your report, but these updates have no impact on your credit score. If for any reason your Credit Line is decreased, you’ll be notified of the reason in writing.*Is there a fee for late payments?**Yes, you will be charged a late fee for each month that the minimum payment is not paid by the payment due date. The first time you’re late, the amount of the late fee will be th

Fuente / Source



Cómoganardinero.eu – Gana dinero fácilmente, aprende a ganar dinero disfrutando del aprendizaje en videos !! Te esperamos 🙂

paypal hack released february 2014 – hack ganar dinero paypal

Publicado en Videos y etiquetado , , , , , , , , .