Member-only story

💰How I Made $2000 from an Easy Bug🐞

Abhijeet kumawat
Cyber Security Write-ups
4 min read2 days ago

✅Free Article Link: Click Here

Hey Bug Bounty Hunters! 🚀

Here’s my one more write-up. This time, we’re talking about an OTP Bypass that could have led to massive account takeovers on a well-known ride-sharing app. Let’s dive in! 🕵️‍♂️💻

Created by Copilot

🔍 The Bug: OTP Bypass in Phone Number Update

I discovered a critical vulnerability in ***** that allowed an attacker to take over any phone number linked to an account. The issue? A broken OTP validation process. 😱

🔥 How the Bug Was Found:

1️⃣ Open the ***** app and go to Account Settings.

2️⃣ Choose to update your phone number.

3️⃣ Enter a new phone number.

4️⃣ The app prompts for a 4-digit OTP verification.

5️⃣ Instead of the real OTP, simply enter “0000”.

6️⃣ BOOM! 🎉 The phone number gets updated — without any verification! 🤯

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in Cyber Security Write-ups

Discover amazing bug bounty write-ups, blogs, ethical hacking guides, CTF solutions, and Hack The Box walkthroughs from top ethical hackers and cybersecurity experts. Stay ahead with expert insights and practical tips!

Written by Abhijeet kumawat

Radhe Radhe ✨ || Jr. Security Consultant || Security Researcher || Bug Hunter || Web Application Penetration Tester || Ethical Hacker ||

Responses (2)

What are your thoughts?

1

4