Mr.MGGaining Control: How Response Manipulation Leads to Higher Privileges (PoC)Greetings, readers! I am Maulik Goti, a Security Analyst👨💻 and Cyber Security Researcher🕵🏻♀️. First, we understand this…May 15May 15
Mr.MGThe Silent Threat: Uncovering IDOR Vulnerabilities Before They’re Exploited (PoC)Greetings, readers! I am Maulik Goti, a Security Analyst👨💻.Apr 29Apr 29
Mr.MGHorizontal Privilege Escalation Attack: Delete Sub-Agent Accounts(POCs)— By Maulik GotiJul 17, 2023Jul 17, 2023
Mr.MGUnauthorized account access using G-mail verification bypass (POCs)- By Maulik GotiJun 9, 2023Jun 9, 2023
Mr.MGTypes of Broken Access ControlManual app state modification. These modifications could be URL modification, browser cookies, and sessions, or the use of custom API…Mar 26, 20231Mar 26, 20231
Mr.MGI got a directory listing on the finance web application (POCs).- By Maulik GotiMar 20, 2023Mar 20, 2023