what you don't know can hurt you
Showing 1 - 5 of 5 RSS Feed

Files from Muhammad Shahbaz

Real NameMuhammad Shahbaz
Email addressprivate
First Active2018-11-08
Last Active2019-05-14
View User Profile
Telenor.com.pk SMS 2-Factor Bypass
Posted May 14, 2019
Authored by Muhammad Shahbaz

Telenor.com.pk appears to allow an attacker set an arbitrary phone number for receiving an SMS for the second factor of authentication.

tags | exploit, arbitrary, bypass
MD5 | 6053749fdef10320a3e40ebce3662f53
Everus.org Mobile Wallet 1.0.9 Information Disclosure
Posted Dec 16, 2018
Authored by Muhammad Shahbaz

Everus.org Mobile Wallet version 1.0.9 suffers from an information disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 46cb71f8f3350c0c3b23cb25bc0d6050
Everus.org 1.0.9 Second Factor Redirection
Posted Nov 16, 2018
Authored by Muhammad Shahbaz

The Everus.org Android application version 1.0.9 has a fundamental design flaw where the client can send a random phone number during the second factor flow with an arbitrary existing user id and the server send the attacker the one time password for the other user.

tags | exploit, arbitrary
MD5 | 81b34424d2fb4ef2f76dd3982050a8b1
Everus.org 1.0.7 Second Factor Client-Side Validation
Posted Nov 8, 2018
Authored by Muhammad Shahbaz

The Everus.org Android application version1.0.7 has a fundamental design flaw where the server provides the second factor to the client for comparison instead of properly validating it server-side.

tags | exploit
MD5 | f4f7dde01fefcdf3cdbd73b8d2fcc159
Everus.org 1.0.7 Second Factor Modification
Posted Nov 8, 2018
Authored by Muhammad Shahbaz

The Everus.org Android application version 1.0.7 has a fundamental design flaw where the client can send a random phone number during the second factor flow and the server will update the number on file.

tags | exploit
MD5 | e2b7ba286b25008cd2b3bf3d822c927f
Page 1 of 1
Back1Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    12 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    16 Files
  • 22
    May 22nd
    13 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close