Not A Guide to hacking betting sites

 DISCLAIMER!!! This is for educational purposes only and not a guide to hacking betting sites.

In this writeup i will try to provide some bugs i have found on betting sites during my almost 3years bug bounty journey.I have reported more than 100 vulnerabilities on betting websites and android application but i will only talk about some bugs.Sorry,I don't have screenshots to demonstrate the vulnerabilities so i will just list  some bugs and their impacts.I will not name the companies for obvious reasons

The writeup lists some  vulnerabilities bug hunters can look for while hunting on betting platforms

so grab some coffee and popcorn and enjoy!

Some are interesting like  changing odds or withdrawing twice or withdrawing money more than your balance:)


IDOR

I found most of IDOR on betting sites on profile id parameters.some occurred on bet history where i could change user bet id history and get any user betting history on the site.


SQLI

Most of then were blind sqli.


RACE CONDITION

What's race condition;

This is a vulnerability that occurs when a request is sent many times within a very short period of time like clicking withdraw button in quick succession.

This is an interesting bug in my opinion as you can find interesting outcomes such as withdrawing cash more than one time,cashing out more times 

Tools:

You can use turbo intruder or write your own script.


PARAMETER MANIPULATION

These vulnerability occurs when changing request parameters such as bet amount or odds in the betting sites.

These can lead to manipulating odds for example a game with 1.5 odd can be manipulated to 3.0 odd  and double the odd.

Another interesting bug i found is betting a game two times.Alaa!!!!!

This is done by capturing the request then placing the bet ids and matches twice or more times in the same request.

HTTP PARAMETER POLLUTION

This happens when you add some parameters on the url and the server identifies it as normal request.

For the bug bounty i was able to withdraw money more than my balance by addding a balance parameter with a custom set balance as seen below;

/userid?id=11&balance=500

OTHER ATTACKS

These are a collection of small or medium bugs that i found.Some were like Account takeover via no rate limit and host header injection on reset password

Shellshock in 2021!

Some Xsses(blind and reflected)

DOS via a long password.A user could register with a long password.You could login first time after sign up but after logging out a user couldn't  login to his account again

Bypass password protection in android app via exported activity

Comments

Popular posts from this blog

SOME BUGS

Taking a Delorean car back to the future:Time related attacks