Account Takeover (ATO) occurs when an attacker gains unauthorized access to a user's account. This can happen through various logic flaws in authentication, password reset, session management, and authorization mechanisms.
Unlike technical vulnerabilities like XSS or SQLi, these are often business logic flaws - the code works as programmed, but the design is fundamentally insecure.
Many applications expose password reset tokens in URLs. If these tokens are predictable, sequential, or reusable, attackers can reset other users' passwords.
This simulates a common mistake where sensitive data (like OTP codes) is leaked in HTML comments, JavaScript source, or API responses.
Right-click on this page and select "View Page Source". Search for "DEBUG" or "OTP" in the HTML. You'll find the correct OTP in a comment!
Session Fixation occurs when an application accepts session IDs from URL parameters or doesn't regenerate session IDs after authentication.
?sessionid=12345vulnerable-site.com?sessionid=12345sessionid=12345