Easy…

In respond to this blogger: https://cehsecurity.com/how-do-u-think-i-bypass-mega-co-nz-payment-system/

0

I’ve taken this game and here is my proof 😛

What I’ll do is to buy a MegaUpload PRO Account which costs 29.99 EUR with only 0.99 EUR using a simple trick with Live HTTP Headers.

This usually happens on applications where inputs are validated only by Javascript and request headers parameters or GET/POST/etc are not being properly checked by the server. In this case, the price were send in plain text directly as a GET variable.

1.

1

 

2.

222222

 

3.

3

 

4.

4

 

5.

5

 

You have used the a Firefox plugin called Tamper Data to do this, but this way is harder than using live http headers or fiddled for example.

Keep your gift as you have no idea about real cybersecurity.

And not, it is not a ‘real’ bypass. Maybe you’ll will understand what this mean!

PS: Take less than 1 minute using Live HTTP Headers 😛

 

Got something to say? Go for it!