Lab #1 Basic password reset poisoning

In this video, we cover Lab #1 in the HTTP Host Header Attacks module of the Web Security Academy. This lab is vulnerable to password reset poisoning. The user carlos will carelessly click on any links in emails that he receives. To solve the lab, log in to Carlos's account.

You can log in to your own account using the following credentials: wiener:peter. Any emails sent to this account can be read via the email client on the exploit server.

▬ 🔗 Links 🔗 ▬▬▬▬▬▬▬▬▬▬

Web Security Academy Exercise Link: https://portswigger.net/web-security/host-header/exploiting/password-reset-poisoning/lab-host-header-basic-password-reset-poisoning

Notes.txt document: https://github.com/rkhal101/Web-Security-Academy-Series/blob/main/HTTP-Host-header-attacks/lab-01/notes.txt

Complete and Continue