Use access techniques to exfiltrate an unprotected facility leftover by developers of a banking website from part of their testing suite to download credentials in the production site and exploit a credential dumping vulnerability.
Learning Objectives
On successful completion of this course, learners should have the knowledge and skills required to:
- Understand how adversaries can exploit an existing Broken Access Control vulnerability by forced browsing to an area of aside that should be unavailable to the current privilege level, and performing a task, in this case downloading credentials, that should be outside the limits of the user