Member-only story

How I Turned a Rate-Limit Bypass into an Account Takeover

Muthu D
4 min readAug 9, 2024

--

Hello, fellow hunters!

In this blog post, I’ll walk you through how I discovered a rate-limit bypass vulnerability that led to an account takeover. Let’s dive into the details.

The Beginning: Reconnaissance

As always, I started with the basics — reconnaissance. I performed the usual steps: subdomain enumeration, crawling URLs, looking for JavaScript leaks, and so on. It was a standard recon process, but this time, it didn’t yield any significant findings.

Shifting Gears: Manual Testing

With no luck in recon, I decided to move on to manual testing, focusing on the registration and login pages. The login page was protected by rate-limit security measures, designed to block brute-force attacks after 20 incorrect attempts.

The Discovery: Rate-Limit Bypass

Determined to find something, I tested various techniques to bypass the rate limit. To my surprise, one method worked! I was able to bypass the rate-limit protection and brute-force passwords indefinitely.

However, brute-forcing passwords is usually considered a low-severity issue (P4). Since I had successfully bypassed the rate limit, I knew the severity might increase to P3 (medium). But I wanted to take it further — I was curious if there were other features vulnerable to the same bypass.

--

--

Muthu D
Muthu D

Written by Muthu D

🔒 Muthu - Bug Bounty Hunter | Secured Google, Microsoft, Apple, Github and more. Join me on Anonysm's quest for a safer digital world.

Responses (3)