1. Web Security Academy
  2. HTTP Host header attacks
  3. Exploiting
  4. Password reset poisoning
  5. Lab

Lab: Basic password reset poisoning


This lab is vulnerable to password reset poisoning. The user carlos will carelessly click on any links in emails that he receives. To solve the lab, log in to Carlos's account.

You can access your own account with the following credentials: wiener:peter. Any emails sent to this account can be read via the email client on the exploit server.