Lab #1 Basic password reset poisoning
In this video, we cover Lab #1 in the HTTP Host Header Attacks module of the Web Security Academy. This lab is vulnerable to password reset poisoning. The user carlos
will carelessly click on any links in emails that he receives. To solve the lab, log in to Carlos's account.
You can log in to your own account using the following credentials: wiener:peter
. Any emails sent to this account can be read via the email client on the exploit server.
▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬
Web Security Academy Exercise Link: https://portswigger.net/web-security/host-header/exploiting/password-reset-poisoning/lab-host-header-basic-password-reset-poisoning
Notes.txt document: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/HTTP-Host-header-attacks/lab-01/notes.txt