# Email Bypass

* [At password reset pages always try manipulating HOST header, you might get lucky and find that the password reset URL contain your own host instead of the original domain name. Just got easy 500$ for this stupid bug.](https://twitter.com/cyb3rsick/status/1114599774039228417)
* [bugbountytip: if a website does not verify email, try signing up with \<whatev>@domain.com (the company email). Sometimes this gives you higher privilege like deleting/viewing any other user's profiles etc.](https://twitter.com/uraniumhacker/status/1066483686655221761)
* [Do you have any problem with creating a new account in some application due to requirement of business email (corp)? Solution is here: #Burp Collaborator. Create an account with blabla@burpcollaborato.net and look after SMTP request at your client. #Security #bugbountytip #webapp](https://twitter.com/zuh4n/status/1083472732778565633)
* [Just found an interesting bug.. can you invite other users (via email usually) to xyz? Try the invite link on a different account and see what happens. In my case, it auto leaked my other accounts email to me. (no prompts to accept invite, didn't validate user) #BugBountyTips](https://twitter.com/zseano/status/1006689291236511744)
* [Ever signup for a service and your account needs approval? Try reset your password as sometimes it bypasses the approval process.. :D #bugbountytips](https://twitter.com/zseano/status/1001165730367361027)
* [#bugbountytip If you can send letters from your email user@shopname.example.com, try to substitute your email with company employers or other users email in the request. You can find it with http://hunter.io  or reg another acc. For me, it worked a few times in private BB.](https://twitter.com/0xw2w/status/1083361794587090944)
* [#BugBountyTip: Always remember to check emails for access control issues. Sometimes the same access control is not applied when sending emails. Thanks@gitlab for the bounty!Quote Tweet](https://twitter.com/y_sodha/status/1146477082181959680)
* [\[Tip\]](https://twitter.com/s0md3v/status/1173603213469110273)

  [Create many accounts with one email :D](https://twitter.com/s0md3v/status/1173603213469110273)

  [A lot of web apps treat example@gmail.com and e.xam.ple@gmail.com as different emails but actually the emails sent to e.xam.ple@gmail.com will be received by example@gmail.com because gmail considers them the same email address.](https://twitter.com/s0md3v/status/1173603213469110273)
* [-Weird bug I found yesterday -victim has email as victim+@gmail.com -i signed up with victimU+0020@gmail.com - deleted my account and victim account got deleted too #bugbountytip](https://twitter.com/Zealsham/status/1258660118868221953)
* Another example of two systems handling data differently and how it can be exploited. tl;dr<<abc@attacker.com>><xyz@target.com> is submitted as the email address Email is sent to <abc@attacker.comBut> <xyz@target.com> gets registered
* [https://nathandavison.com/blog/exploiting-email-address-parsing-with-aws-se](https://t.co/9BNelny0AY?amp=1)<br>

![https://twitter.com/intigriti/status/1272860780694843392?s=20](https://1889062997-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-LbWrDBBrbM1WtGeIKRO%2F-MT9r5muxsWHTDQQGkyE%2F-MT9rYvXV8PgLbY4booD%2Fimage.png?alt=media\&token=65035643-e01b-482b-80fd-040a856b8703)

* Validate your email address with the payload you can here: - <https://twitter.com/Haoneses/status/1292456202857742338?s=20>
* <http://sphinx.mythic-beasts.com/~pdw/cgi-bin/emailvalidate>
* [1.Account setting page: Update new Email: Normal: "Email":"me@gmail.com" (200 OK) New: "Email":"admin@target.com" (error msg : u can't change the email to@target.com ) New Update: "Email":" admin@target.com " (200 OK) just add space Bounty: 500$ #bugbountytips #hackerone](https://twitter.com/pub3g/status/1341333438549303300?s=20)
