GitHub / Compcode1 / ioc10-hidden-parameter-injection
This case study analyzed a fileless privilege escalation attack where the adversary exploited an undocumented administrative override parameter (admin_override=true) to bypass standard authentication and gain elevated access without triggering any alert or logging trail through normal access controls.
Stars: 0
Forks: 0
Open issues: 0
License: gpl-3.0
Language: Jupyter Notebook
Size: 23.4 KB
Dependencies parsed at: Pending
Created at: 3 days ago
Updated at: 3 days ago
Pushed at: 3 days ago
Last synced at: 3 days ago
Topics: application-logging-failure, fileless-attack, http-post-injection, ioc-case-study, privilege-escalation