LAB - Insecure Token Management
In this lab environment, you will have GUI access to a Debian machine. An application named HeyDoc is available on the Android Emulator.
Objective: Your task is to find issues with HeyDoc's access token management and understand how they can be exploited to gain unauthorized access.
The valid credentials for the HeyDoc app are as follows:
Username: alice
Password: Bazinga@12345#
HeyDoc's app backend code is available at the following location for analysis:
/home/student/Desktop/heydoc-backend


Frist, run the andorid emultor and up the APP. After it, we can see a Reset Password Option, so... configurate the proxi -->
## View us IP
hostname -I
## Set local proxy
adb shell settings put global http_proxy <host-ip>:8080
Now intercept the reset password peticion -->

This app know we are alice because we have a token, if we can enumate other token, maybe we can change the password of other user
But I can see one stranger thing into the token: "token_number", if i change 101 by 102, i can change the password of others users -->

Last updated