IDOR on Ios Application

 A friend asked me to do a pentest for their company,A  Kenyan fintech company.For obvious reasons i cannot name the company. Everything was to be audited(sites,android and ios apps)

After looking at the websites i couldn't find anything interesting except for  enabled xmrplc,broken links hijacking  and some unrestricted directories. I even tried scanning the site with wpscan.WordPress sucks!

As a newbie ios pentester i decided to challenge myself to find atleast one bug on their app.After downloading the app from the appstore i proxied the iphone  to burpsuite.As static analysis of ios app is tiresome and not straightforward as android(just unpacking the apk file which is basically zip file) i opted for dynamic analysis.The procedure of setting up proxy in ios is the same as on android,just set ip address and port then install burp certificate. Fortunately ,No ssl pinning :)


I started by signing up on the app.I received the confirmation  email and my 4 numbers PIN.I then tried bruteforcing the PIN as 4 number PINs are insecure(only 10,000 possible combinations).sadly after 4 failed tries the account gets locked 

after sorting out locked out issue,i logged in and checked burpsuite for profile details traffic and to my shock there was an id parameter.

I just changed my Id by adding one to the last character and when i checked the response tab i saw another customer details(phone number,name,balance).

The screenshot shows the request and response.



So what's the most critical thing i could do, why not try withdrawing as the IDOR bug gave my full access to other users accounts?. I could even change their PIN.

I tried withdrawing but could find withdrawal button so i was left disappointed 

Comments

Popular posts from this blog

SOME BUGS

Not A Guide to hacking betting sites

Taking a Delorean car back to the future:Time related attacks