Author: Латров (Latrov)

  • 2 Steps to Bypass OTP in Mobile Apps: Successful VAPT Scenarios

    Welcome mate, here are listed 2 Steps to Bypass OTP in Mobile Apps: Successful VAPT Scenarios, hopefully you find it helpful and please pay attention.

    Resecurity conducted hundreds of VAPT (Vulnerability Assessment and Penetration Testing) engagements for customers of different sizes and profiles—ranging from Fortune 100 corporations to emerging start-ups looking to test their cybersecurity controls before going live. Interestingly enough, regardless of the maturity of the company, issues related to API and authorization were identified in many cases, especially when the application had been developed by a third party.

    Bypass OTP in Mobile Apps: Successful VAPT Scenarios

    This white paper describes the most common issues identified as a result of successful testing, when our specialists are able to identify critical vulnerabilities and recommend a path to mitigate them, thereby preventing possible damage if a real-life attack exploits these vulnerabilities and the company suffers a data breach or a leak of customer data.

    Learn How To Hack Debit Cards Or Credit Cards And Withdraw Money Bypassing OTP Using MTOPass OTP Bypass Carding Software

    These vulnerabilities have been identified in numerous mobile apps and SaaS-based applications, serving a large number of customers. Failing to patch them in a timely manner may lead to significant risks, especially in the fintech sector, where attackers may exploit such flaws for fraudulent operations, leveraging customer accounts for their own benefit bypassing MFA.

    What is MFA?

    Multifactor Authentication (MFA) or Two-Factor Authentication (2FA) is when a user is required to present more than one type of evidence in order to authenticate on a system. There are five different types of evidence (or factors) and any combination of these can be used, however in practice only the first three are common in web applications.

    2 Steps to Bypass OTP in Mobile Apps: Successful VAPT Scenarios

    It should be noted that requiring multiple instances of the same authentication factor (such as needing both a password and a PIN) does not constitute MFA and offers minimal additional security. The factors used should be independent of each other and should not be able to be compromised by the same attack. While the following sections discuss the disadvantage and weaknesses of various different types of MFA, in many cases these are only relevant against targeted attacks.

    What is OTP?

    One Time Password (OTP) tokens are a form of possession-based authentication, where the user is required to submit a constantly changing numeric code in order to authenticate. The most common of which is Time-based One Time Password (TOTP) tokens, which can be both hardware and software based.

    A cheaper and easier alternative to hardware tokens is using software to generate Time-based One Time Password (TOTP) codes. This would typically involve the user installing a TOTP application on their mobile phone, and then scanning a QR code provided by the web application which provides the initial seed. The authenticator app then generates a six digit number every 60 seconds, in much the same way as a hardware token.

    Most websites use standardized TOTP tokens, allowing the user to install any authenticator app that supports TOTP. However, a small number of applications use their own variants of this, which requires the users to install a specific app in order to use the service. This should be avoided in favour of a standards-based approach.

    SMS messages or phone calls can be also used to provide users with a single-use code that they must submit as an additional factor. Due to the risks posed by these methods, they should not be used to protect applications that hold Personally Identifiable Information (PII) or where there is financial risk. e.g. healthcare and banking. NIST SP 800-63 does not allow these factors for applications containing PII.

    Email verification requires that the user enters a code or clicks a link sent to their email address. There is some debate as to whether email constitutes a form of MFA, because if the user does not have MFA configured on their email account, it simply requires knowledge of the user’s email password (which is often the same as their application password).

    There are also Hardware OTP Tokens, which generate a constantly changing numeric codes, which must be submitted when authenticating. Most well-known of these is the RSA SecureID, which generates a six digit number that changes every 60 seconds. Some implementations require a backend server, which can also introduce new vulnerabilities as well as a single point of failure.

    What businesses are using OTP

    Many types of businesses and organizations utilize One-Time Passwords (OTPs) as a security measure to protect user accounts and sensitive information. Common sectors include:

    1. Financial Institutions: Banks, credit card companies, and online payment platforms (e.g., PayPal, Stripe) use OTPs for authenticating transactions and login attempts. Major global banks, payment service providers (e.g., Visa, MasterCard, PayPal), and investment platforms all implement OTPs as part of their security protocols. Compliance with regulations such as the EU Payment Services Directive (PSD2) often mandates strong customer authentication, including OTPs.
    2. E-commerce Platforms: Online retailers often require OTP verification during account creation, login, or high-value transactions.
    3. Telecommunications Providers: Mobile carriers and telecom services use OTPs for account access, SIM card activation, and fraud prevention.
    4. Government Agencies: To secure access to government portals, tax systems, and citizen services, OTPs are frequently employed.
    5. Healthcare Providers: Hospitals and health insurance companies use OTPs for accessing sensitive health records and insurance information.
    6. Email and Cloud Service Providers: Companies like Google, Microsoft, and Dropbox utilize OTPs for two-factor authentication (2FA).
    7. Social Media Platforms: Platforms such as Facebook, Twitter, and Instagram implement OTPs to enhance account security.
    8. Online Gaming and Gambling Sites: To prevent unauthorized access, these platforms often require OTP verification.
    9. Enterprise and Corporate Systems: Organizations implement OTPs for secure remote access to corporate networks and applications.

    Overall, OTPs are a widely adopted security feature across various industries to mitigate unauthorized access and enhance security. At the same time, incidents involving OTP bypass continue to occur, which underscores the need for extensive security testing.

    OTP Bypass Vulnerabilities

    What are the primary root causes of OTP bypass vulnerabilities?

    1. Blind Trust in Client-Side Decisions

    Many apps treat the client (mobile device) as trustworthy. When the server sends a response like “OTP verification failed,” the app accepts this at face value. Attackers exploit this by intercepting and altering the response to OTP verified successfully and the app blindly obeys, bypassing security.

    2. Stateless or Weak Session Tracking

    Some systems don’t maintain a record of whether OTP verification was truly completed. After sending an OTP, the server forgets the context. Attackers can skip validation entirely because the server doesn’t double-check if the OTP step was legitimately finished.

    3. Lack of Response Integrity Checks

    Responses from servers often lack digital signatures or tamper-proofing. Attackers can freely edit responses (e.g., changing “false” to “true”) because there’s no cryptographic seal to prove the data is authentic.

    Below, mt103.org/ outlines the most common attack vectors leading to successful OTP bypass exploitation:

    1- Password Reset OTP Bypass

    2 Steps to Bypass OTP in Mobile Apps: Successful VAPT Scenarios

    Technique Description

    Attackers submit an invalid OTP during password reset, then manipulate either:

    1. Response (changing success: false → true), or
    2. Request (removing the OTP parameter entirely).

    Key Flaws Exploited:

    • Client-Side Enforcement: App trusts modified responses without server reconfirmation.
    • Optional OTP Field: Server fails to reject requests missing OTP.

    Impact:

    • Full password reset without OTP access.
    • Immediate account compromise.

    Steps

    1- Trigger OTP Request

    Open app → “Forgot Password” → Enter victim’s email → Capture request in Burp:

    2 Steps to Bypass OTP in Mobile Apps: Successful VAPT Scenarios

    2- Submit invalid OTP (e.g., 1111) → Capture in Burp:

    2 Steps to Bypass OTP in Mobile Apps: Successful VAPT Scenarios

    3- Change the request to get this response and then edit the response

    4- response manipulation change true to false and remove error massege

    Modify Server Response

    Forward the request until you see the response:

    {“success”:false}

    {“success”:true}

    Right-click → “Do Intercept” → “Response to this request” → Forward modified response.

    5- Verify Bypass

    Proceed to set a new password, The server accepts the manipulated response and allows the password to be changed

    6- Enter new password

    7- Observe app now allows password reset without valid OTP.

    Login with new password Login using the new password. Full account access is granted

    2- Account Verification OTP Bypass

    Technique Description

    Attackers intercept the server’s response during email/phone verification and alter the outcome from verified: false to verified: true. This exploits the app’s reliance on client-side validation, allowing account verification without submitting a valid OTP.

    Key Flaws Exploited:

    • Stateless Verification: Server doesn’t recheck OTP status post-response.
    • Unsigned Responses: Lack of cryptographic signatures enables tampering.

    Impact

    • Fake verification enables fraud (e.g., unauthorized transactions, fake profiles)
    • Exposes sensitive features to unauthorized access

    1- Trigger Email Verification

    • Verify Email → Capture request:

    2- Intercept the server’s response.

    3- Change false to true and remove error messages.

    4- App now marks the email as verified without valid OTP.

    What Else Should Be Tested?

    What are the primary root causes of OTP bypass vulnerabilities? The techniques described in this whitepaper are just a part of the very broad spectrum of possible threats and attack vectors leading to OTP bypass.

    mt103.org/ recommends that businesses perform an in-depth assessment according to OWASP Web Application Security Testing (WSTG), which includes the following phases:

    • 4.1 Information Gathering
    • 4.2 Configuration and Deployment Management Testing
    • 4.3 Identity Management Testing4.4 Authentication Testing
    • 4.5 Authorization Testing
    • 4.6 Session Management Testing
    • 4.7 Input Validation Testing
    • 4.8 Testing for Error Handling
    • 4.9 Testing for Weak Cryptography
    • 4.10 Business Logic Testing
    • 4.11 Client-side Testing
    • 4.12 API Testing

    Our experts hold the following industry certifications and have an extensive track record of successful work with the leading Fortune 500 companies and government agencies:

    • CISSP (Certified Information Systems Security Professional)
    • CEH (Certified Ethical Hacker)
    • CISA (Certified Information Systems Auditor)
    • GIAC GCIH (Certified Incident Handler)
    • Offensive Security Certified Professional (OSCP)
    • GIAC Web Application Penetration Tester (GWAPT)
    • eLearn Security Certified Penetration Tester eXtreme (eCPTX)
    • eLearn Security Web Application Penetration Tester Extreme (eWPTXv2)
    • eLearnSecurity Certified Professional Penetration Tester (eCPPTv2)
    • Attify Certified IoT Security Pentester (ACIP)
    • eLearnSecurity Mobile Application Penetration Tester (eMAPT)
    • Certified Red Team Professional (CRTP)
    • CREST Registered Penetration Tester (CRT)
    • CREST Practitioner Security Analyst (CPSA)

    For more info contact us right away anytime at [email protected]. or use the contact button on below of our website to reach out for quick response and our specialists will be happy to assist you with web application security, mobile app testing, and API testing. For more information about VAPT (Vulnerability Assessment and Penetration Testing) services by mt103.org/, you may review the following page.

  • MT103 vs MT202: What’s the Difference?

    MT103 vs MT202: What’s the Difference?

    MT103 and MT202 are both SWIFT message formats used in international payments, but they serve different purposes, MT103 vs MT202 difference guide.

    MT103 vs MT202: What’s the Difference?

    MT103 vs MT202 difference

    —MT103 is used for customer transactions, such as sending or receiving international payments.

    —MT202 is used to transfer funds between banks and does not involve individual customers.

    As a customer, you will primarily be dealing with MT103 messages when sending or receiving international payments. MT202 messages are used internally by banks to transfer funds among themselves, so they do not concern individual customers.

    The table below summarises the differences between MT103 and MT202.

    MT103: Mt103 purpose is for customer payments specifically individuals and businesses, customer details are included.

    MT202: mt202 purpose is bank to bank transfers, specifically for banks only and customer’s details are not included.

    To further break it down, the following are the plain explanations for the purpose and functions.

    • Interbank Fund Transfers: The primary function of an MT202 is to transfer funds between banks.
    • Covering MT103s:
      It acts as a “cover” message for customer-initiated payments (like an MT103 message) by communicating the underlying fund movement without revealing sensitive customer details to intermediary banks.
    • Audit Trail: It creates an important audit trail for tracking funds as they move between financial institutions during international payments.
    • Settlement Process: It’s used in the settlement process between banks and for liquidity adjustments within their own accounts.

    Messaging Type Key Characteristics

    • Bank-to-Bank: The message is strictly for communication between financial institutions, not directly involving individual customers.
    • Customer Information: Unlike an MT103, an MT202 does not carry customer-specific details.
    • Regulatory Compliance: The MT202 COV (Cover) variant specifically separates sensitive customer data to help meet regulatory standards such as anti-money laundering (AML) and know your customer (KYC) requirements.

    MT103 vs MT202 difference

    Why It Matters

    Security: By separating customer details, it enhances the security and confidentiality of cross-border payments.

    Efficiency: It speeds up the payment process by allowing intermediary banks to focus on fund transfers without needing to handle customer-specific information.

    Transparency: Although customers may not see the MT202, the information it carries helps ensure transparency in the overall payment chain.

    CLICK HERE TO GET MT103 SOFTWARE

    For more info or inquiries kindly hit the below left corner button to contact us.

  • MT103 SWIFT Payment Software Flash Funds

    MT103 SWIFT Payment Software Flash Funds

    Get MT103 SWIFT Payment Software Flash Funds if you want to do MT103 swift payment with GPI automatic, MT202, MT700, MT760, MT799, MT199 and more. Cash/credit transfer, IPIP, IPID, DLC and custom CIS then you must need the MT103 Swift software;

    YouTube player

    Click Here To Get MT103 Swift Payment Software With Flash Funds Enabled.

    With MT103 Swift Payment Software you can do the following types of payments:

    • Local Payment (NIP/INTER-BANK/NATIONAL): local payment is when you want to pay someone in Russia and you are also living in Russia then you want to pay the person (local bank transfer), in this case the payment will arrive instantly.
    • Cross Boarder Payment: cross boarder payment is when you live for example, in India or any other country in the world and you want to pay someone in Australia (it can be tagged “swift payment”), in this case the MT103 cash or credit transfer will not arrive or reflect instantly on receiver’s bank account available balance. It will take two to three (2-3) business days to arrive into beneficiary’s bank account available balance.

    Most of these scammers set this payments, configure it before they begin the transaction initiation using MT103 Swift Software.

    What is MT103 Swift Payment System Used For?

    Mainly, it’s used for mt103 swift, the key features of it are listed on first paragraph, cyber criminals misuse it as well for flash payments if the flash funds option is enabled.

    Cyber criminals use this software for flash funds payments to finalise business deals, purchase of goods (digital assets inclusive such as bitcoin or usdt tokens on P2P platforms) learn more here.

    Most of these criminals operate in person as well with people whom don’t know them or their real identity and disappear, majority of these criminals use thi mt103 software for P2P payments on crypto exchanges, they open an order for usdt or bitcoin and pay with it.

    MT103 Swift Payment

    With the flash funds option enabled on the mt103 software they are able to make payments of millions for digital assets, this has been a weapon for these cyber criminals against businesses and individuals which has plunged many individuals into bankruptcy as a result of this.

    How Cybercriminals Commit Bank Fraud Using MT103 Swift Payment System

    They can easily send $1,000 and above to any bank account in the world and the beneficiary (their victim) will receive it instantly as local payment or within three (3) business days as swift/foreign wire transfer (cross boarder) payment.

    Does The Flash Funds Reflect On Bank Account Available Balance?

    This specific flash funds payment or MT103 swift payment with flash enabled that cybercriminals use to make money off P2P traders or business/companies actually reflects on bank account available balance, the answer to this question is (YES).

    Breakdown Of Flash Funds Reflection On Bank Account Available Balance

    For example, you are the victim that is targeted and you already have one hundred thousand dollars ($100,000) in your bank account as current available balance then the cyber criminal sends you twenty thousand dollars ($20,000) to your bank account, upon the arrival of the inward payment (inflow), to your bank account, the current available balance of your bank account will be updated to one hundred and twenty thousand dollars ($120,000).

    MT103 SWIFT Payment Software Flash Funds

    This is how the flash funds into bank account available balance works, it is how the reflection of the flash funds occurs when cyber criminals initiate the flash funds transaction.

    How Cybercriminals Buy Crypto With MT103 Flash Funds Payment

    The criminal (buyer) will appear as buyer of your digital asset while some will use it for various things and after they pay their victim (seller) of digital assets, when the victim (seller) confirms payment has been received amd releases the digital asset to the buyer (the cyber criminal) that’s it.

    Whatever the issue with payment involving bank that comes up afterwards is all on the victim to deal with, this has led thousands of P2P traders around the world to huge loss.

    How P2P Crypto Traders Lose Millions To Flash Funds Scam

    A cyber criminal will download a crypto exchange app, most of them use Binance, Inflowbit, Kucoin, Kraken or Bitget and more. After they downloaded this app they will buy verified crypto exchange account and they will login with the info and open trade to buy crypto in the P2P section, any victim that comes forward to sell to them, they will flash their account with the exact amount generated on the P2P platform for the order, the victim will confirm payment and release the digital asset to the scammer.

    The MT103 Flash Payment will fail after the designated time of hibernation, this will trigger bank’s security system to flag the customer’s account as fraud, the bank will then go ahead to make decision which will lead to the victim losing their digital asset sold and their account closed for fraud;

    Have it on mind there are two types of Flash Funds and the following are the breakdown.

    Two (2) Types Of Flash Funds

    There are two types of flash funds and they vary just like there are different types of swift messaging ranging from 103 to 202 types and more, it depends on what is being targeted or scammer’s needs,

    How Many Types Of Flash Funds Exist?

    Only two types of flash funds exist, Fake Bank Alert that is commonly done by text and phone number and Flash Payment that us done with MT103 Swift Payment System Flash Enabled.

    What’s The Difference Between Flash Funds And Fake Bank Alert?

    The difference between Fake Bank Alert and Flash Funds is clear, it is not something anyone can be confused of.

    Break Down Of Flash Funds And Fake Bank Alert Difference

    Fake Bank Alert: this means, it will be just mere fake credit alert and it won’t reflect on bank account available balance, it will not be anywhere near authentic enough to be convincing because for any scammer who wants to do fake bank alert to someone they are targeting as their victim, they will need to obtain the following informations;

    • Bank account details
    • Phone number (the correct one linked to the receiver’s bank account which the receiver use to receive bank alerts)
    • Email address (the correct email linked to receiver’s bank account)

    What Does The Scammer Need Above Information For?

    The scammer will need the above informations to use them and send the target the fake bank credit alert using fake bank alert platform, now take note;

    Even if the scammer is able to obtain the above details, what about the current figure that is in the target’s bank account as available balance? That’s where they will easily be caught and mission will fail instantly.

    In a clear explanation, you have one million pounds sterling (£1,000,000) in your bank account available balance and a scammer that wants to defraud you with fake bank alert sends you fake alert and you are seeing one hundred thousand as your bank available balance would you foolishly fall for such cheap scam? Ofcourse you will not,

    It will raise suspicion that will lead to thorough further check because the numbers don’t add up, learn more on how to detect fake bank alert here and stay informed.

    MT103 Swift Payment System Flash Enabled

    This means, it is not mere fake bank alert because for any scammer to do flash funds transaction they will need just the receiver’s basic bank details that is required for normal bank transfers (to receive payment).

    Kindly take note, they don’t need any of the following details!

    • Receiver’s phone number
    • Receiver’s email address
    • Knowledge of receiver’s current balance

    MT103 Swift Payment System With Flash Enabled will handle the rest, just receiver’s bank account details for receiving of payment is required, the cyber criminal will send exact amount agreed on wether is physical goods purchase or digital asset such as cryptocurrency, the payment will reflect on receiver’s bank account available balance and it will be updated to new balance,

    There will be no suspicion until business or transaction with the party is closed and they moved on, the victim will face bank problems for fraudulent activity accusation.

    The payment will be flagged and deemed suspicious and inauthentic transaction, some banks may tag it “Failed” then go on to add the customer on watch list,

    If you are an active P2P trader reading this article you must have experienced this before, in some cases receiving fraudulent money, you must have encountered this problem whereby your bank blocked your account for fraudulent activity or the payment you confirmed is nowhere to be found after you have released digital asset to the buyer and even if you report them to the exchange they can’t be traced because they withdraw the assets immediately after you released them and they will abandon that account, buy another one and start again.

    How MT103 Swift Flash Works

    Mt103 flash works by establishing hybernated prepayment in an encryption flow between receiver’s banking system and the MT swift (MFFS often use the JOIPsc or SVVER/PYTT protocols). All outflows from the system locks in a command for payment authenticity checking initiation to commence after a designated time frame.

    Does MT103 Swift Flash Require VPN?

    No VPN is required from the user of the software, all activities on the software are encrypted. The system automatically provides different IP every minute and points to different locations in the world that even if cracked you can’t be traced, this is to conceal in event of any attack to protect users.

    MT103 SWIFT Payment Software Flash Funds

    How To Get MT103 Swift Payment System

    Click Here To Get MT103 Swift Payment Software With Flash Funds Enabled.

    Any Additional Costs After Purchasing The MT103 Swift Payment Software?

    No, there is no additional cost when you get the mt103 swift payment software flash funds, it’s one payment and full access is granted that will last for 12 months, for further inquiry on MT103 SWIFT payment software flash funds kindly hit the contact button below and talk to our support.

error: Content is protected !!