Account Takeover by OTP bypass | Burp Suite | Bcrypt Hash Exploitation |

Поделиться
HTML-код
  • Опубликовано: 27 ноя 2024

Комментарии • 11

  • @shubham_indalkar
    @shubham_indalkar Месяц назад +1

    Great explanation. Thanks

  • @Jamaal_Ahmed
    @Jamaal_Ahmed Месяц назад

    Thanks bro i learned alot of things your content , susbcribed 🎉❤ .

    • @itspyguru
      @itspyguru  Месяц назад +1

      Thanks for the sub!

  • @muskansingh3839
    @muskansingh3839 Месяц назад +1

    👍👍

  • @shouvikkundu8289
    @shouvikkundu8289 Месяц назад +1

    Why did you try this method rather than trying to crack the bcrypt Encryption and get the Otp in plain text?

    • @itspyguru
      @itspyguru  Месяц назад

      You can't, brcypt is a hashing technique and you can't reverse engineer hashes. As chatgpt said in the tutorial.

    • @shouvikkundu8289
      @shouvikkundu8289 Месяц назад

      @@itspyguru So that's why only matching the hash value with the '6 digit' number hash is the only option?

    • @itspyguru
      @itspyguru  Месяц назад

      Yes, and this applies on all kind of hashes

    • @shouvikkundu8289
      @shouvikkundu8289 Месяц назад

      ​​@@itspyguruThanks for the information your video was really informative ❤

  • @Trolltaless
    @Trolltaless 9 дней назад

    "Ce8JRsXCwJqdY6X0pXKeaI2FQY1ScSLFLCSGd9 " is this any type of hash?

    • @itspyguru
      @itspyguru  9 дней назад

      You can't tell like this, it depends where it's coming from. Sometimes random strings are generated for others purposes to identify users, sessions, carts, products and many more things