Cracking Time-Based Tokens: A Glimpse from a Workshop During leHACK 2025-Singularity
· 9 min read
On the night of June 28th, 2025 (technically June 29th, because the workshop was at 3AM — yes, 3 in the morning), I attended a hands-on workshop at leHACK 2025 Singularity, titled:
“Insecure time-based secret in web applications and Sandwich attack exploitation”
by Tom Chambaretaud — Technical Lead @YesWeHack & Bug Bounty Hunter
This blog post covers only a small part of the workshop: the exploitation of password reset tokens based on PHP's uniqid()
function.
For more advanced scenarios and techniques (MongoDB ObjectIDs, rainbow tables, etc.), I highly recommend checking out Tom’s blog:
👉 https://www.aeth.cc