⚡ One Click to Chaos: How I Chained CSRF with Open Redirects for Account Takeover
文章描述了作者在面对生活中的各种困难时,意外发现了一个潜在的安全漏洞。通过使用多种工具和技术进行信息收集和分析,最终发现了一个可能存在更多安全问题的重定向参数。 2025-8-31 11:23:6 Author: infosecwriteups.com(查看原文) 阅读量:9 收藏

Iski

Free link 🎈

Hey there!😁

Press enter or click to view image in full size

Image by AI

You know life is hard when your coffee machine refuses to work, your Wi-Fi drops mid-burp scan, and the only constant in life is your Recon script running on a VPS. But that day? That day the universe gave me a gift 🎁 — a shiny, vulnerable endpoint just waiting to be poked.

🕵️ Recon Phase — Digging the Gold Mine

I kicked off with mass recon using subfinder, amass, and my custom chaos script to map the attack surface. While scraping through URLs with gau and waybackurls, I spotted a weird-looking redirect param buried deep in an old GraphQL endpoint:

https://target.com/graphql?next=https://evil.com

At first glance, it screamed open redirect, but I had a hunch there was more gold hidden here.


文章来源: https://infosecwriteups.com/one-click-to-chaos-how-i-chained-csrf-with-open-redirects-for-account-takeover-fd9d5d753402?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh