Skip to content

Penetration Testing Tools

  • Home
  • Data Forensics
  • Ethical Hacking
  • Mobile Hacking
  • Network Attacks
  • Vulnerability Assessment
  • Web AppSec
  • OSINT
  • Code Assessment
  • Malware Offense
  • IoT
  • Cryptography
  • Arsenal Lab
  • Hardware/Embedded
  • Malware Defense
  • Network Defense
  • Reverse Engineering
  • Smart Grid/Industrial Security
  • Home
  • Data Forensics
  • Ethical Hacking
  • Mobile Hacking
  • Network Attacks
  • Vulnerability Assessment
  • Web AppSec
  • OSINT
  • Code Assessment
  • Malware Offense
  • IoT
  • Cryptography
  • Arsenal Lab
  • Hardware/Embedded
  • Malware Defense
  • Network Defense
  • Reverse Engineering
  • Smart Grid/Industrial Security

Penetration Testing Tools

  • Vulnerability

Researcher Details 0-Click Facebook Account Takeover Vulnerability

by ddos · March 6, 2024

Nepalese cybersecurity researcher Samip Aryal made history by identifying a vulnerability in Facebook’s password reset system that allowed a malefactor to seize any account without any action from the victim.

Aryal’s discovery not only earned him an unprecedented reward from the company but also secured him a top position in Facebook’s Hall of Fame among white-hat hackers for the year 2024. The amount of the reward, however, remains undisclosed.

Aryal revealed that Facebook’s password reset feature lacked a limit on the number of attempts to request a code, enabling attacks without user intervention. An attacker could initiate a password reset request and brute-force the six-digit security code.

Aryal’s investigation demonstrated that when resetting passwords through Android Studio, users were prompted to receive a security code via a Facebook notification. Remarkably, the code remained valid for two hours, even after multiple unsuccessful entry attempts. Aryal noted that, unlike SMS-based resets, the code was not invalidated after several erroneous attempts.

By employing brute-force methods, Aryal managed to test all possible code combinations within an hour, uncovering a vulnerability that allowed the code to be displayed directly in the notification without needing to click on it. Aryal reported the flaw to Facebook on January 30, 2024, and by February 2, the issue had been resolved.

Tags: 0-Click Facebook Account TakeoverFacebook Account Takeover

Follow:

  • Next story ChatGPT Users Hacked: Credentials Sold on Dark Web
  • Previous story CVE-2024-27198 and CVE-2024-27199: Critical Security Flaws Affecting TeamCity On-Premises

Search

MAKE THE WEBSITE ONLINE

  • Popular Posts
  • Tags
  • Subdomain Takeover CLI Tool

    Vulnerability Assessment

    Subdominator: CLI tool for detecting subdomain takeovers

    June 3, 2025

  • Artifact collection tool

    Data Forensics

    Fennec: Artifact collection tool for *nix systems

    May 4, 2025

  • Live Forensics

    Data Forensics

    Live Forensicator: Powershell Script to aid Incidence Response and Live Forensics

    May 5, 2025

  • Carseat

    Ethical Hacking

    Carseat: Python Implementation for Remote Seatbelt Security Checks

    May 5, 2025

  • Pentest Reporting

    Web AppSec

    pecoret: A Pentest Collaboration and Reporting Tool

    May 6, 2025

  • 5G Amazon AMD Android Apple ARM Artificial intelligence Asus ChatGPT chrome Dell facebook Firefox Github google Google Chrome Huawei India Intel Lenovo LG Linux Linux Kernel MediaTek Meta Micron Microsoft microsoft edge Mozilla MSI Nvidia OpenAI Qualcomm Samsung SK Hynix Sony TSMC twitter ubuntu windows Windows 7 Windows 10 Windows 10X Windows 11 Xbox




Reward

Brilliantly

SAFE!

meterpreter.org

Content & Links

Verified by Sur.ly

2022

  • Home
  • About Us
  • Contact Us
  • DMCA NOTICE
  • Privacy Policy

Penetration Testing Tools © 2025. All Rights Reserved.