Registration Vulnerabilities

Takeover

Duplicate Registration

  • Try to generate using an existing username

  • Check varying the email:

    • uppsercase

    • +1@

    • add some some in the email

    • special characters in the email name (%00, %09, %20)

    • Put black characters after the email: test@test.com a

    • victim@gmail.com@attacker.com

    • victim@attacker.com@gmail.com

Username Enumeration

Check if you can figure out when a username has already been registered inside the application.

Password Policy

Creating a user check the password policy (check if you can use weak passwords). In that case you may try to bruteforce credentials.

SQL Injection

****Check this page to learn how to attempt account takeovers or extract information via SQL Injections in registry forms.

Oauth Takeovers

SAML Vulnerabilities

Change Email

when registered try to change the email and check if this change is correctly validated or can change it to arbitrary emails.

More Checks

  • Check if you can use disposable emails

  • Long password (>200) leads to DoS

  • Check rate limits on account creation

  • Use username@burp_collab.net and analyze the callback

Last updated