labs
Lab - 1: Basic password reset poisoning (A)
how forgot password works in this lab ?
POST /forgot-password HTTP/1.1
Host: 0a2e00ee047f2fdbc0bd31ff00010045.web-security-academy.net
...
csrf=TmWD6yKuj2ZaYbUZkL6sH3f6jom3mvU3&username=wienerhttps://0a2e00ee047f2fdbc0bd31ff00010045.web-security-academy.net/forgot-password?temp-forgot-password-token=WLiNjn9NG1CUePEojyt8OtuiaCr3clziPOST /forgot-password?temp-forgot-password-token=Hg1GwkdzYSEpDG5FDG5M3gNMULH0vGPS HTTP/1.1
Host: 0a2e00ee047f2fdbc0bd31ff00010045.web-security-academy.net
...
csrf=9FlVx2UgbGDnst1PfLnKjyNdNp2h9wPi&temp-forgot-password-token=Hg1GwkdzYSEpDG5FDG5M3gNMULH0vGPS&new-password-1=peter&new-password-2=peterHow to exploit other user
Lab - 2: Password reset poisoning via middleware (P)
Lab - 3: Password reset poisoning via dangling markup (E)
Lab - 4: Web cache poisoning via ambiguous requests
Lab 5 : Host header authentication bypass (A)
Lab - 6: Routing-based SSRF (P)
Last updated