BURP SUITE OTP BYPASS

 ⛩️ ⛩️

Disclaimer: I will be censored about the target on my Practice, so find your own target. WARNING!!! This is Education Purpose Only


Open Mozilla Firefox then configure the Proxy like this


Open Burpsuite

Create a Temporary Project, then click next until Burpsuite shows the Dashboard.

After the Dashboard Burpsuite opened, navigate to Proxy Menu then Intercept. Make sure your Intercept is on because if Intercept is off you can’t use it.


After you set Intercept is on navigate on Mozilla Firefox then navigate to your website target


Your Intercept text will be changed to orange text, you must forward it until the page on Mozilla Firefox normally opened.

Login into the page that you have to navigate it, after you Login. The page on Mozilla Firefox will not successfully load after you click the Forward button in the Burpsuite.

Click forward until the next page is showing

After the next page is showing, I can see there are 2 buttons available, GO & Resend Code. The next step you must hit the Resend Code button again. Then the Burpsuite will show the Cookies Data

You will ask, Where is the OTP Code? Chill, you must Decode the Cookies Data First. Open in another Browser, then navigate to https://www.urldecoder.org/ paste the Cookies Data (the Red Color Text in Image) into urldecoder the result will look clean like this

and Now, Where is the fucking OTP CODE? Just check in the Output you’ve decode it.

Congratulations! You have OTP CODE right now. Now back to Mozilla Firefox input the OTP CODE then click GO!

You have BYPASSED the OTP CODE.

Enjoy! follow us for more . . . 

No comments:

Post a Comment

How to make Hash objects with $H() function in JavaScript.mp4

 In JavaScript, you can create hash-like objects using the $H() function, which is commonly associated with the Prototype.js framework. How...