In the previous blog posts, I wrote about my observations, which could lead to an account takeover. Under certain conditions this was possible using the laptop of some one
else. But if there is no laptop available,
then there might be other opportunities.
Observations
During the period updating my email addresses, I found several ways to find the Account section. I could search for the word Account.
Another way was to scan for an icon. A circle above the upper halve of a circle is a Profile menu. The picture resembles a head above a pair of shoulders. Another picture of three horizontal bars is a more common way to indicate a menu. For the fast-food lovers, it is also known as the hamburger.
And there is a third way. On a day I could not find the word Account or some similar symbol like profile. It costed me several attempts to stop searching on my own.
Who you gonna call? The helpdesk.
The friendly call center agent asked me, which help could be offered. I just called to change my email address. In return I got a lot of questions to authenticate, that I was the rightful owner of the account. Questions were about personal information like name and other private information.
The call center agent told, that my email address would be changed. I would get some emails. One of them contained the message, that my account was removed. This was not my initial plan.
Not on my call.
But there was something wrong with the security. There were some dangerous things, which could go wrong.
Hiders in the storm.
Discoveries
If there is a way to change things, it only takes one call.
Naming the term
Security questions are questions, which can only be answered by the owner of the account. It is like two factor authentication as mentioned in the previous blog post.
Naming the conditions
As a tester I have to look at security. If I use my observations, how would I do an account takeover. In other words, how do I reverse engineer an account takeover.
Sketching a test idea
Here is a rough description to take over an account.
Collect personal information about a person.
Call the help desk and tell, that the email address must be changed.
Answer the security questions using the collected personal information of this person.
After receiving the mail, that the email address has been changed, then it is time to change the rest of the account.
Later, to the login page, press on the link ‘Password forgotten’, and follow the instructions.
Change the password and then the user name. password. The account has been taken over.
Maling a concern
After the incident with the call center, I mailed the security issue to the company.
Recommendations for the system administrators
Configure the system in such way, that calls about changing user settings are recorded. There are systems, which can record phone calls. This includes the phone numbers.
Check the login patterns. using the log. E.g. if the user entered a wrong password once every 3 attempts and only right passwords are entered, then is a change that another user is using the account.
Check patterns of changes of accounts. E.g. if several accounts of team members have been changed within a short period of time, then there might be someone who uses personal information to take over accounts.
Check the use of two facto! authorization.
Check new email address on a frequent base.
Automate checks. Determine new metrics to act upon, make code to check it, and mail the strange patterns to the administrator. E.g. the use of the account during the night.
Looking backward
For better, for security.