Two easy ways to break phone verification
Same registration flow, same final impact, two different OTP bypasses.
- bug-bounty
- web-security
- otp
- business-logic
Welcome to my blog!!
I'm 20 and I've been unofficially hunting bugs for as long as I can remember. What started as taking things apart to see how they work recently turned into official research.
Most of my time is spent between reverse engineering and chasing the kind of edge cases that shouldn't exist in production. This is where I post my notes and whatever systems I'm currently breaking.
Same registration flow, same final impact, two different OTP bypasses.
How AI helped me move faster on a paywall bypass by turning frontend clues into the right API path.
A simple Pre-ATO caused by weak ownership checks across signup, SSO, and account recovery flows.
First paid bounty: HTML in a profile bio that turned into a phishing surface on a real domain.