Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Full Admin Account Takeover via Insecure ID Parameter | Bug Bounty PoC

Автор: WhiteHat Workspace

Загружено: 2025-09-27

Просмотров: 2909

Описание:

In this video I demonstrate a critical account takeover vulnerability that allowed me to compromise an admin account via an insecure UID-based endpoint. During testing I discovered an endpoint that exposed admin UIDs, and another endpoint that accepted a user id (UID) parameter and returned/updated account details. Because the server did not validate ownership, changing the id to an admin UID allowed viewing and updating that admin’s profile — including replacing the phone number with a number I control. After changing the phone, I was able to authenticate using the updated number, resulting in a complete admin account takeover.

This video is a Bug Bounty Proof of Concept (PoC) recorded with full permission from the organization. I have responsibly disclosed the issue and received approval to publish this demo.

What this video covers (high-level):

Discovery of exposed admin UIDs

How insecure id parameters (UID IDOR) lead to broken access control

Real-world impact: view and edit admin details → account takeover

Responsible disclosure and recommended mitigations

Impact & risk:
This is a critical broken access control / IDOR issue that can lead to full account takeover of privileged users, exposing sensitive data and allowing administrative actions. Immediate remediation is recommended.

Notes:

This video avoids showing destructive actions or step-by-step exploit instructions that could enable abuse.

The work shown here was authorized; do not test systems without explicit permission.

admin account takeover, idor, uid vulnerability, broken access control, bug bounty poc, account takeover poc, ethical hacking, web application security, bug bounty 2025, responsible disclosure,hacking admin accounts,idor bug bounty,account takeover vulnerability,bug bounty live demo,how to find idor,ethical hacking tutorial,critical web app vulnerability,api idor exploit,broken authentication,session hijacking,account security bypass,web security research,penetration testing 2025,web app hacking,how to hack web apps,live hacking demo,bug bounty india,bug bounty pakistan,uid parameter vulnerability,real world bug bounty,full account takeover,cybersecurity awareness,critical bug bounty finding,web application exploit,bug bounty step by step

Full Admin Account Takeover via Insecure ID Parameter | Bug Bounty PoC

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Critical Account Takeover Vulnerability via Password Reset Endpoint  Bug Bounty  #bugbounty

Critical Account Takeover Vulnerability via Password Reset Endpoint Bug Bounty #bugbounty

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

Чем ОПАСЕН МАХ? Разбор приложения специалистом по кибер безопасности

How I legally hacked British Airways (Live Bug Bounty Hunting And Recon)

How I legally hacked British Airways (Live Bug Bounty Hunting And Recon)

Broken Access Control — The IDOR That Still Works

Broken Access Control — The IDOR That Still Works

ATO POC on Autodesk payapps  - my first $$$$ bounty

ATO POC on Autodesk payapps - my first $$$$ bounty

Свой VPN-сервер за пару кликов (Amnezia всё поставит сама)

Свой VPN-сервер за пару кликов (Amnezia всё поставит сама)

Live bug bounty hunting: Critical RCE vulnerability found on a real website #hacking #bugbounty

Live bug bounty hunting: Critical RCE vulnerability found on a real website #hacking #bugbounty

Critical IDOR Leading to Full Account Takeover | $2,500 Bug Bounty PoC on SuryaElectronics.in

Critical IDOR Leading to Full Account Takeover | $2,500 Bug Bounty PoC on SuryaElectronics.in

How to Discover High-Paying IDOR Bugs in Real Apps?

How to Discover High-Paying IDOR Bugs in Real Apps?

Как я взломал сайт за 8 минут

Как я взломал сайт за 8 минут

How I found XSS on a Bugcrowd Program 🚨 | Bug bounty technique | XSS POC

How I found XSS on a Bugcrowd Program 🚨 | Bug bounty technique | XSS POC

Advent of Cyber 2 - Day 2 | The Elf Strikes Back - Upload a Shell & Get Reverse Shell Access

Advent of Cyber 2 - Day 2 | The Elf Strikes Back - Upload a Shell & Get Reverse Shell Access

Find IDORs and get paid $$$$ 😎 My Step-by-Step Method

Find IDORs and get paid $$$$ 😎 My Step-by-Step Method

Это незначительное поведение Chrome приводит к захвату аккаунта

Это незначительное поведение Chrome приводит к захвату аккаунта

🚨Sensitive Information Disclosure - Live Bug Hunting PoC!🚨

🚨Sensitive Information Disclosure - Live Bug Hunting PoC!🚨

2FA Bypass on https://portal.singlestore.com  | Bug Bounty PoC

2FA Bypass on https://portal.singlestore.com | Bug Bounty PoC

The Most Overlooked Bug in Web Apps: HTTP Request Smuggling (Deep Dive)

The Most Overlooked Bug in Web Apps: HTTP Request Smuggling (Deep Dive)

Critical Account Takeover Vulnerability via Password Reset Endpoint | Bug Bounty PoC (Live Testing)

Critical Account Takeover Vulnerability via Password Reset Endpoint | Bug Bounty PoC (Live Testing)

Critical Information disclosure vulnerabilities_Bug Bounty Hunting | PoC_2024

Critical Information disclosure vulnerabilities_Bug Bounty Hunting | PoC_2024

How I Found an IDOR in Okta | Bug Bounty Walkthrough

How I Found an IDOR in Okta | Bug Bounty Walkthrough

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]