<thead id="prjbr"></thead>
<big id="prjbr"></big>

<noframes id="prjbr"><del id="prjbr"><em id="prjbr"></em></del>
<font id="prjbr"><del id="prjbr"></del></font>

    <dfn id="prjbr"></dfn>
    <thead id="prjbr"><del id="prjbr"><rp id="prjbr"></rp></del></thead>
      <sub id="prjbr"></sub>
      <noframes id="prjbr">
      <address id="prjbr"></address>

          Home News Microsoft Awarded $50k Bounty For Reporting An Account Hijack Vulnerability

          Microsoft Awarded $50k Bounty For Reporting An Account Hijack Vulnerability

          by Abeerah Hashim
          Microsoft account hijack vulnerability

          Microsoft has recently awarded a $50,000 bounty to a researcher for discovering a crucial account hijack vulnerability. The vulnerability could have allowed an adversary to take over any target account without permission.

          Microsoft Account Hijack Vulnerability

          Security researcher Laxman Muthiyah has found a critical vulnerability affecting Microsoft users’ accounts. Exploiting this vulnerability allowed to hijack any Microsoft user account without consent.

          The researcher has earlier discovered critical security flaws affecting Instagram and Facebook accounts as well.

          Elaborating his findings of the Microsoft bug in a blog post, the researcher stated that the vulnerability basically existed in the password reset feature.

          Briefly, when a user requests a password reset, Microsoft sends a security code to the users’ email address. After sending the code, the website then displays a new prompt where the user should enter the code. At this point, an adversary can try brute-forcing the code. However, Microsoft applies rate limiting to prevent such attacks alongside encrypting the entered code before sending it for validation.

          However, the researcher figured out a bypass as he could meddle with the encryption process. Moreover, he tweaked his code to send bulk codes at the same time whilst making sure that the codes also reach the server together. In this way, he could evade any IP blacklisting or rate-limiting attempt.

          As explained in the post,

          I figured out the encryption technique and was able to automate the entire process from encrypting the code to sending multiple concurrent requests…
          After some days, I realized that they are blacklisting the IP address if all the requests we send don’t hit the server at the same time, even a few milliseconds delay between the requests allowed the server to detect the attack and block it. Then I tweaked my code to handle this scenario and tested it again…
          Surprisingly, it worked.

          The researcher demonstrated that the attack would even work for accounts secured with 2FA. Though, taking over those accounts would add the additional step of brute-forcing the 2FA codes too.

          $50,000 Bounty Awarded

          After discovering this vulnerability, the researcher made videos of the exploit and informed Microsoft about it.

          Microsoft quickly acknowledged his report and patched the bug in November 2020. Aside from the fix, Microsoft also rewarded the researcher with a $50,000 bounty.

          You may also like

          Leave a Comment

          Latest Hacking News

          Privacy Preference Center

          Necessary

          The __cfduid cookie is used to identify individual clients behind a shared IP address and apply security settings on a per-client basis.

          cookie_notice_accepted and gdpr[allowed_cookies] are used to identify the choices made from the user regarding cookie consent.

          For example, if a visitor is in a coffee shop where there may be several infected machines, but the specific visitor's machine is trusted (for example, because they completed a challenge within your Challenge Passage period), the cookie allows Cloudflare to identify that client and not challenge them again. It does not correspond to any user ID in your web application, and does not store any personally identifiable information.

          __cfduid, cookie_notice_accepted, gdpr[allowed_cookies]

          Advertising

          DoubleClick by Google refers to the DoubleClick Digital Marketing platform which is a separate division within Google. This is Google’s most advanced advertising tools set, which includes five interconnected platform components.

          DoubleClick Campaign Manager: the ad-serving platform, called an Ad Server, that delivers ads to your customers and measures all online advertising, even across screens and channels.

          DoubleClick Bid Manager – the programmatic bidding platform for bidding on high-quality ad inventory from more than 47 ad marketplaces including Google Display Network.

          DoubleClick Ad Exchange: the world’s largest ad marketplace for purchasing display, video, mobile, Search and even Facebook inventory.

          DoubleClick Search: is more powerful than AdWords and used for purchasing search ads across Google, Yahoo, and Bing.

          DoubleClick Creative Solutions: for designing, delivering and measuring rich media (video) ads, interactive and expandable ads.

          doubleclick

          Analytics

          The _ga is asssociated with Google Universal Analytics - which is a significant update to Google's more commonly used analytics service. This cookie is used to distinguish unique users by assigning a randomly generated number as a client identifier. It is included in each page request in a site and used to calculate visitor, session and campaign data for the sites analytics reports. By default it is set to expire after 2 years, although this is customisable by website owners.

          The _gat global object is used to create and retrieve tracker objects, from which all other methods are invoked. Therefore the methods in this list should be run only off a tracker object created using the _gat global variable. All other methods should be called using the _gaq global object for asynchronous tracking.

          _gid works as a user navigates between web pages, they can use the gtag.js tagging library to record information about the page the user has seen (for example, the page's URL) in Google Analytics. The gtag.js tagging library uses HTTP Cookies to "remember" the user's previous interactions with the web pages.

          _ga, _gat, _gid

          狠狠热精品免费视频_亚洲国内自拍愉拍_亚洲综合视频一区二区三区_无码专区无码专区视频网网址