Think Fast: How Auto-Complete Suggested Me Passwords That Weren’t Mine ᾒf
作者通过工具组合进行大规模信息收集时发现一个配置错误的表单和GraphQL端点导致浏览器泄露其他用户密码。 2025-8-9 05:33:25 Author: infosecwriteups.com(查看原文) 阅读量:197 收藏

Iski

Free link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by Perplexity AI

_”I just wanted to book a cab. Ended up almost unlocking someone else’s account. Thanks, autofill.”_

You ever sit at your desk with a plate of noodles, Netflix on the second monitor, and Burp Suite humming like it knows you’re about to hit paydirt? Yeah, that was me. One hand on the fork, the other CTRL+Shift+I-ing through a bug bounty target. Little did I know, a forgotten <input> field would cough up passwords like an over-sharer on truth serum.

Let’s dive into how one misconfigured form, a forgotten GraphQL endpoint, and a very talkative browser nearly handed me other users’ passwords on a silver platter.

It all started with a pretty simple goal: mass recon.

I used a combo of tools like:

  • Subfinder + Amass for subdomain enumeration
  • httpx for probing alive hosts

文章来源: https://infosecwriteups.com/think-fast-how-auto-complete-suggested-me-passwords-that-werent-mine-%E1%BE%92f-d5c26ad34a3a?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh