Not A Guide to hacking betting sites
DISCLAIMER!!! This is for educational purposes only and not a guide to hacking betting sites.
In this writeup i will try to provide some bugs i have found on betting sites during my almost 3years bug bounty journey.I have reported more than 100 vulnerabilities on betting websites and android application but i will only talk about some bugs.Sorry,I don't have screenshots to demonstrate the vulnerabilities so i will just list some bugs and their impacts.I will not name the companies for obvious reasons
The writeup lists some vulnerabilities bug hunters can look for while hunting on betting platforms
so grab some coffee and popcorn and enjoy!
Some are interesting like changing odds or withdrawing twice or withdrawing money more than your balance:)
IDOR
I found most of IDOR on betting sites on profile id parameters.some occurred on bet history where i could change user bet id history and get any user betting history on the site.
SQLI
Most of then were blind sqli.
RACE CONDITION
What's race condition;
This is a vulnerability that occurs when a request is sent many times within a very short period of time like clicking withdraw button in quick succession.
This is an interesting bug in my opinion as you can find interesting outcomes such as withdrawing cash more than one time,cashing out more times
Tools:
You can use turbo intruder or write your own script.
PARAMETER MANIPULATION
These vulnerability occurs when changing request parameters such as bet amount or odds in the betting sites.
These can lead to manipulating odds for example a game with 1.5 odd can be manipulated to 3.0 odd and double the odd.
Another interesting bug i found is betting a game two times.Alaa!!!!!
This is done by capturing the request then placing the bet ids and matches twice or more times in the same request.
HTTP PARAMETER POLLUTION
This happens when you add some parameters on the url and the server identifies it as normal request.
For the bug bounty i was able to withdraw money more than my balance by addding a balance parameter with a custom set balance as seen below;
/userid?id=11&balance=500
OTHER ATTACKS
These are a collection of small or medium bugs that i found.Some were like Account takeover via no rate limit and host header injection on reset password
Shellshock in 2021!
Some Xsses(blind and reflected)
DOS via a long password.A user could register with a long password.You could login first time after sign up but after logging out a user couldn't login to his account again
Bypass password protection in android app via exported activity
Comments
Post a Comment