Hey folks, welcome back to my "finding bugs without tools" series. This time, I stumbled on a super simple (but impactful) that led to a complete account lockout for victims that came from nothing more than exploiting a simple inconsistency in how a system handled user identity.
π The Setup
My target was a website with a learning platform. The structure was common:
Main Site (target.com): Featured a sign-up form asking for:
UsernameNameEmailPassword
Learning Subdomain (course.target.com): This subdomain had its own, simpler sign-up process, asking for just:
EmailPassword
Everything seemed normal at first glance. The main site login used email/Username and password, which worked perfectly.
The Red Flag
The first clue emerged after signing up on the course.target.com subdomain. The confirmation email arrived with a greeting like:
"Hi **jinx@mail.com**, welcome to our courses!"

This was interesting. The system used my email address as my username for the course platform. This is a common practice to simplify things, but it planted a crucial idea in my head.
To confirm, I looked at the page source code after logging in. Sure enough, I found a field like:

Assumption solidified: On the course subdomain,
email == username.
Here's where the logic diverged. The login form for course.target.com didn't ask for an email. It asked for:
UsernamePassword
Not Email and Password. This is the key inconsistency. The system created an account using an Email as the Username, but the login form labeled the field Username, not Email.
This created a potential for confusion, but I was about to turn that confusion into a vulnerability.
π§ͺ The Exploit
Here's where it got interesting. Back on the main target site, I created a new account like this:
Here was my plan:
- On the main site (
target.com), I signed up for a new account. - For the
Usernamefield, I enteredjinx@mail.com - For the
Emailfield, I enteredmyemail@gmail.com(my own personal email).
The sign-up was successful! The main site now had an account where:
- Username:
jinx@mail.com - Email:
myemail@gmail.com
The Trigger: Complete and Total Lockout
Now for the exploit. A victim, trying to access their courses, goes to course.target.com. They see the login form asking for Username and Password. Naturally, they enter their credentials:
- Username:
jinx@gmail.com - Password:
TheirPassword
What happens? π Nothing. The login just hangs, times out, or fails without any clear message.
The victim, frustrated, clicks "Forgot Password."
The system happily sends a reset link to jinx@mail.com. They reset their password, no problem.
But when they try to log in againβ¦ β nope. It still doesn't work.
They're stuck in a complete lockout loop β even after changing their password, the account is unreachable.

Why did this happen? As far as I understand, the logical flaw was that when I created a new account on the main Target app, the database ended up having two entries with the same username (jinx@mail.com). This is a problem, but I was still able to use my account perfectly when logging in with email and password. However, logging in with username and password caused issues.

I don't know remember more about this bug. I reported it last year, and they told me they wanted my name and LinkedIn to add me to their Hall of Fame, but they never did.
β¨ Final Thoughts
At the end of the day, this whole finding reminded me why I love bug hunting without tools. It's not always about fancy scanners or automated scripts β sometimes the best bugs show up when you just slow down, read carefully, and think like a regular user.
A simple mismatch between username vs. email turned into a total account lockout bug. It's the kind of thing that hides in plain sight, waiting for someone curious enough to ask, "What if I try this?"
π Stay tuned for more "No-Tool Bug Bounty" write-ups! Got questions? Email me: strangerwhite9@gmail.com or reach out on
Twitter: @StrangeRwhite9
by StrangeRwhite | Series: Finding Bugs Without Tool
