Chaining attack vectors to pwn a company.

  1. The workflow of the Application.
  2. Technical Understanding of the application.
  3. Chaining up and Exploiting the vulnerability on the basis of my enumeration.

Workflow of the Application

Technical Understanding

  1. `mobile` parameter
  2. `password` parameter
  3. `confirmPassword` parameter
  1. `uri`
  2. `consumerId`






Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Safe Living in the Internet Age

Fireside Chat with FIO protocol

Digital Rights Ireland and communications surveillance in the EU

BitsCrunchNFT Securing the NFT world

Meet Our Partners: Electrik Finance

{UPDATE} Number Meld Hack Free Resources Generator

East-west security beyond the firewall — our investment in ShieldX

What Is Malware and How Can It Affect My Website?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Rony Das

Rony Das


More from Medium

Root me: Bash — System 1

App Sec / Pentest Experienced Interview Questions (2–6 yrs)

Five Useful Tips for Securing Java Apps

Understanding Vulnerability Dependency Management