“Day 26: The WebSocket Hijack — How I Eavesdropped on Every Customer Support Chat”
攻击者利用某银行客户支持门户的实时聊天功能中的WebSocket协议漏洞,通过操控简单且可预测的认证令牌,成功劫持并实时监听所有活跃支持会话,并注入消息,导致保密性被破坏,最终获得6000美元漏洞赏金。 2025-9-18 07:27:45 Author: infosecwriteups.com(查看原文) 阅读量:4 收藏

Exploiting the Trusting Handshake of Real-Time Communication

Aman Sharma

The target was a major bank’s customer support portal. They had a sleek, modern live chat feature powered by WebSockets. It felt responsive and secure. But during testing, I noticed the initial WebSocket connection didn’t use a typical Authorization header. My curiosity turned to shock when I realized the authentication mechanism was a simple, predictable token passed in the URL. By manipulating this token, I didn’t just hijack one chat — I gained the ability to connect to any active support session in real-time, listening in and even injecting messages. This breach of confidentiality led to a $6000 bounty.

free link

Press enter or click to view image in full size

Why WebSockets Are a Unique Attack Surface

WebSockets provide full-duplex, persistent communication channels over a single TCP connection. This is great for real-time apps like chat, notifications, and trading platforms. But this persistence creates new risks:

  • Custom Protocols: They often implement bespoke authentication and authorization logic, bypassing standard HTTP security controls.
  • Statefulness: The connection is stateful. If you can…

文章来源: https://infosecwriteups.com/day-26-the-websocket-hijack-how-i-eavesdropped-on-every-customer-support-chat-de5ddc819ad2?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh