In this write-up, I will explain how I was able to chain five vulnerabilities that led to one link click account takeover.