Table of Contents
- Response Manipulation
- Enter the code 00000
- Changing the password
- Enter NULL
- Advanced Brute
- 2FA Code leakage in Response
- Status Manipulation
- CSRF - Turn-off 2FA
- 2FA Code re-usability
- Click-Jacking on 2FA Disable Feature
- Session Issues: Enabling 2FA doesn’t expire previous one
- JS file Analysis: Some expert says there may be a chance to break by gaining useful info
- Missing 2FA code integrity validation
- Business Logic bugs
- Sharing unused tokens
- OAuth compromise
- Re-send code and reset the limit
- Guessable cookie
- Subdomains / APIs: using old versions that don’t support 2FA (so it is directly bypassed)
- MITM/Social Engineering (Out Of Scope in bug-bounty hunting)
- Duplicate-Generator
- SIM Jacking
- Backup Code Abuse
- Framing the 2FA Disabling page