Artwork

Content provided by Amin Malekpour. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Amin Malekpour or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Ep. 1 – Breaking OTP Security, Exploiting Static Domains & Privilege Escalation via Role Misconfigurations

19:12
 
Share
 

Manage episode 464012183 series 3643227
Content provided by Amin Malekpour. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Amin Malekpour or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges?

In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor oversights into critical exploits:

  • Leaking OTPs in API responses – Breaking authentication at the source.
  • Static domain to account takeover – When persistence turns into a full exploit.
  • Privilege escalation via role mismanagement – How attackers bypass access controls.

Learn how these vulnerabilities were discovered, exploited, and mitigated.

Chapters:

00:00 - INTRO

01:00 - FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses

05:20 - FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence

12:05 - FINDING #3 - Privilege Escalation via User Invitations and Role Assignment

16:49 - OUTRO

Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us [email protected]
🔗 Podcast Website → Website Link

  continue reading

Chapters

1. INTRO (00:00:00)

2. FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses (00:01:00)

3. FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence (00:05:20)

4. FINDING #3 - Privilege Escalation via User Invitations and Role Assignment (00:12:05)

5. OUTRO (00:16:49)

11 episodes

Artwork
iconShare
 
Manage episode 464012183 series 3643227
Content provided by Amin Malekpour. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Amin Malekpour or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

What if your OTP security wasn’t secure at all? What if a static domain—something most people ignore—could lead to full account takeover? And what if flawed role management allowed admins to escalate privileges?

In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world security failures that turned minor oversights into critical exploits:

  • Leaking OTPs in API responses – Breaking authentication at the source.
  • Static domain to account takeover – When persistence turns into a full exploit.
  • Privilege escalation via role mismanagement – How attackers bypass access controls.

Learn how these vulnerabilities were discovered, exploited, and mitigated.

Chapters:

00:00 - INTRO

01:00 - FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses

05:20 - FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence

12:05 - FINDING #3 - Privilege Escalation via User Invitations and Role Assignment

16:49 - OUTRO

Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us [email protected]
🔗 Podcast Website → Website Link

  continue reading

Chapters

1. INTRO (00:00:00)

2. FINDING #1 - The Vulnerability That Defeats OTP Security: Leaking OTP Codes in API Responses (00:01:00)

3. FINDING #2 - From Static Domain to Account Takeover: The Power of Persistence (00:05:20)

4. FINDING #3 - Privilege Escalation via User Invitations and Role Assignment (00:12:05)

5. OUTRO (00:16:49)

11 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play