Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/xamiron/bypassed-the-otp-verification-process
bypassed the OTP verification process using "Turbo Intruder Extension"
https://github.com/xamiron/bypassed-the-otp-verification-process
authentication burteforce otp-verification security-automation turbo
Last synced: about 1 month ago
JSON representation
bypassed the OTP verification process using "Turbo Intruder Extension"
- Host: GitHub
- URL: https://github.com/xamiron/bypassed-the-otp-verification-process
- Owner: xamiron
- Created: 2024-02-07T06:09:39.000Z (12 months ago)
- Default Branch: main
- Last Pushed: 2024-02-20T12:05:44.000Z (11 months ago)
- Last Synced: 2024-02-20T13:26:52.441Z (11 months ago)
- Topics: authentication, burteforce, otp-verification, security-automation, turbo
- Language: Python
- Homepage:
- Size: 3.91 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# bypassed-the-OTP-verification-process using "Turbo Intruder Extension" follow the steps below:
# Step: 1
1. You have to know the OTP length.
2. You Have to know OTP validity time.
3. You have to know how may time your system wrong attemp take.# Step: 2
1. Capture your payment request and send to "Turbo Intruder" Extension.
2. Before sending the request to Turbo Intruder, you entered the incorrect OTP.
3. Replace otp=328129 to otp=%s:
![1 1](https://github.com/xamiron/bypassed-the-OTP-verification-process/assets/120724779/368431d3-2dbc-4274-a5f2-35ceca623635)4. Write python script and start attack:
![Screenshot_10](https://github.com/xamiron/bypassed-the-OTP-verification-process/assets/120724779/c502fbd4-f8f6-404c-b5da-2f1ac75196ae)![1 2](https://github.com/xamiron/bypassed-the-OTP-verification-process/assets/120724779/348a68a0-5947-4000-a4a5-48a21f8598a1)