Go Back   Carder.life > [en] International Forum > Hacking & Coding



Reply
 
Thread Tools Display Modes
  #1  
Old 02-11-2025, 10:14 PM

spalr spalr is offline
Join Date: Aug 2022
Posts: 111
Default


Important Note: Firstly you need fresh , clean RDP server!
When you got RDP server, connect and do everything in that server for maximum safety, I insist on this.
1. Reusable CSRF Token:
The CSRF token “that authenticate every single request made by the user” which can be also found in the request body of every request with the parameter name “Auth” get changed with every request made by user for security measures, but after a deep investigation I found out that the CSRF Auth is Reusable for that specific user email address or username, this means If an attacker found any of these CSRF Tokens, He can then make actions in the behave of any logged in user.
Hmm, it seems interesting but still not exploitable, as there is no way for an attacker to get the “Auth” value from a victim session.
2. Bypassing the CSRF Auth System:
The CSRF Auth verifies every single request of that user, So what If an attacker “not logged in” tries to make a “send money” request then PayPal will ask the attacker to provide his email and password, The attacker will provide the “Victim Email” and ANY password, Then he will capture the request, The request will contain a Valid CSRF Auth token Which is Reusable and Can authorise this specific user requests. Upon Further Investigation, We have found out that an Attacker can obtain the CSRF Auth which can be valid for ALL users, by intercepting the POST request from a page that provide an Auth Token before the Logging-in process, check this page for the magical CSRF Auth “https://www.paypal.com/eg/cgi-bin/we..._send-money”. At this point the attacker Can CSRF “almost” any request on behave of this user .
The application generates a valid “Auth” token for a logged-out user!
Through examination of the password change process, he found that an attacker can NOT Change the victim password without answering the Security Questions set by user, Also the user himself can NOT change the security questions without entering the password!
3. ByPassing the Security Questions Change:
The initial process of “setting” security questions is not password protected and is reusable.
After further investigation, noticed that the request of setting up the security questions “which is initiated by the user while signing up” is not password-protected, and it can be reused to reset the security questions up without providing the password, hence, Armed with the CSRF Auth, an attacker can CSRF this process too and change the victim’s Security questions.
At this point, An attacker can conduct a targeted CSRF attack against a PayPal users and take a full control over his account Hence, An attacker can CSRF all the requests including but not limited to:
  1. Add/Remove/Confirm Email address

  2. Add fully privileged users to business account

  3. Change Security questions

  4. Change Billing/Shipping Address

  5. Change Payment methods

  6. Change user settings (Notifications/Mobile settings and more)


  #2  
Old 02-11-2025, 10:40 PM

Lisdman Lisdman is offline
Join Date: Sep 2021
Posts: 0
Default


A few years ago, I discovered a PayPal bug that allowed you to make purchases under $200 USD.
I'm going to mention it here in case it still works. You only need a few ingredients, like any good recipe. First, let's start with the basics: you created an account with information like your first name, last name, or simply any nickname that wasn't real, as well as other personal information. You used a disposable or prepaid mobile number. Next, you ignored adding a bank card, but you did use an empty account number to register within the platform's payment system. This is where they'll try to charge us the $200 USD in the future. Spoiler alert: it's impossible because there are no funds.
Let's move on to how to do it, since they've registered us in the system after entering the amounts PayPal enters to activate the account.
At this point, we need to find a supplier or seller who wants to collect via PayPal. We have to remember that the maximum amount is 200 USD; exceeding this limit means it won't work.
We must ask them to issue us an invoice for the product or service for a maximum amount of 200 USD. This is where the key comes in: making sure the payment deadline doesn't expire, and that there aren't any days to wait, because this blocks what will happen next. We must make the seller believe there's a verification issue on our account and that they must wait at least 4 weeks to collect. During this time, the PayPal system trusts the seller and processes the payment. However, there is such a delay that when the seller or PayPal discovers it has happened, they simply can't get the money from the account because it's empty. This has been possible by issuing the invoice without an expiration date and having passed these weeks. Invoices or requests to collect will continue to arrive on this account, but they will be unable to collect. Without real collection or personal data, it's just another small fraud in a big ocean that simply won't amount to anything.




Reply

Tags
NULL

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump




All times are GMT. The time now is 01:48 PM.