Artwork

Amin Malekpour에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Amin Malekpour 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

Ep. 2 – Chaining IDORs, CSRF Account Takeovers & Token Manipulation for Privilege Escalation

19:16
 
공유
 

Manage episode 464019330 series 3643227
Amin Malekpour에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Amin Malekpour 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges?

In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world pentest findings that prove creative exploitation turns small flaws into critical security risks:

  • Chaining IDORs for account takeover – Exploiting weak access controls.
  • CSRF bypass to reset security questions – Turning one click into total compromise.
  • Privilege escalation via token manipulation – How a simple change led to admin access.

Learn how these vulnerabilities were discovered, exploited, and mitigated.

Chapters:

00:00 - INTRO

01:02 - FINDING #1 - Account Takeover by Chaining Two IDORs

07:19 - FINDING #2 - Account Takeover Through CSRF Vulnerability in Security Questions

12:18 - FINDING #3 - Privilege Escalation Through Authorization Token Manipulation

17:05 - OUTRO

Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us [email protected]
🔗 Podcast Website → Website Link

  continue reading

챕터

1. INTRO (00:00:00)

2. FINDING #1 - Account Takeover by Chaining Two IDORs (00:01:02)

3. FINDING #2 - Account Takeover Through CSRF Vulnerability in Security Questions (00:07:19)

4. FINDING #3 - Privilege Escalation Through Authorization Token Manipulation (00:12:18)

5. OUTRO (00:17:05)

13 에피소드

Artwork
icon공유
 
Manage episode 464019330 series 3643227
Amin Malekpour에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Amin Malekpour 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

What if you could take over an account—not by cracking a password, but by chaining two overlooked vulnerabilities? What if a single CSRF exploit let attackers reset security questions and hijack accounts? And what if manipulating an authorization token could escalate privileges?

In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world pentest findings that prove creative exploitation turns small flaws into critical security risks:

  • Chaining IDORs for account takeover – Exploiting weak access controls.
  • CSRF bypass to reset security questions – Turning one click into total compromise.
  • Privilege escalation via token manipulation – How a simple change led to admin access.

Learn how these vulnerabilities were discovered, exploited, and mitigated.

Chapters:

00:00 - INTRO

01:02 - FINDING #1 - Account Takeover by Chaining Two IDORs

07:19 - FINDING #2 - Account Takeover Through CSRF Vulnerability in Security Questions

12:18 - FINDING #3 - Privilege Escalation Through Authorization Token Manipulation

17:05 - OUTRO

Want your pentest discovery featured? Submit your creative findings through the Google Form in the episode description, and we might showcase your finding in an upcoming episode!
🌍 Follow & Connect → LinkedIn, YouTube, Twitter, Instagram
📩 Submit Your Pentest Findings https://forms.gle/7pPwjdaWnGYpQcA6A
📧 Feedback? Email Us [email protected]
🔗 Podcast Website → Website Link

  continue reading

챕터

1. INTRO (00:00:00)

2. FINDING #1 - Account Takeover by Chaining Two IDORs (00:01:02)

3. FINDING #2 - Account Takeover Through CSRF Vulnerability in Security Questions (00:07:19)

4. FINDING #3 - Privilege Escalation Through Authorization Token Manipulation (00:12:18)

5. OUTRO (00:17:05)

13 에피소드

모든 에피소드

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생