No. 1 driver Password Reset Vulnerability
The user client is doing well, but the driver must do well.
Detailed description:
Submit packet capture
Code Region
POST /vip-d/driver/resetPwd HTTP/1.1
Content-Length: 30
Content-Type: application/x-www-form-urlencoded
Host: vipdrvier.vvipone.com
Connection: Keep-Alive
captcha=4888&phone=15088888888
No sign parameter (compared with the user client) used to verify data integrity in driver data packets)
The server that sent the No. 1 brute-force cracking vehicle imposes restrictions on consecutive requests. All normal high-speed scanning and brute-force cracking will be cut off.
So when the thread is cracked, the thread is set to about 4-6 very low (you can also use multiple agents to crack it). The verification code is valid for 5 minutes because the verification code is 4-digit verification code.
5 minutes with a low thread
Proof of vulnerability:
Solution: