How I Escalated Privileges from “User” to “Admin”
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章内容,理解主要信息。 文章的开头提到作者已经一年没有写文章了,现在分享一个有趣的事情。接着,他描述了一个测试的应用程序,有六个不同的用户角色,每个角色都有自己的仪表盘和独特的权限。他从最低权限的用户开始测试,目标是看看是否能从受限账户跳转到管理员账户。 在测试过程中,他首先尝试手动修改URL访问管理员仪表盘,但没有成功。然后他使用代理拦截网络请求,试图修改API端点,结果还是失败了。看起来他在尝试常见的横向权限提升方法。 现在我需要将这些信息浓缩到100字以内。重点包括:应用程序有多级用户角色、测试者从最低权限开始、尝试通过修改URL和API端点提升权限但失败。因此,总结应该涵盖这些关键点。 最后,确保语言简洁明了,直接描述内容,不需要开头语。 </think> 文章描述了一位安全测试人员尝试从最低权限用户账户提升至管理员账户的过程。该应用程序拥有六种不同用户角色和各自的权限结构。测试者首先尝试手动修改URL访问管理员界面未果,随后使用代理工具拦截并修改API请求,但仍然未能成功突破权限限制。 2026-2-17 17:32:22 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Saurabh sanmane

Press enter or click to view image in full size

Hello Hackers! 👋

It’s been a year since my last write-up, so I thought lets share something interesting.

Free Link

The application I was testing had a structured hierarchy with six different user roles. Each role had its own specific dashboard and unique permissions.

Naturally, I started at the very bottom: the lowest privileged user.

My mission? See if I could “jump” from my restricted account into the shoes of an Admin.

Press enter or click to view image in full size

My first instinct was to try the easy stuff. I logged in and tried to manually change the URL. If the admin dashboard is at /users, maybe I can just type that in?No luck.

Press enter or click to view image in full size

Next, I fired up my proxy to intercept the web requests. I tried modifying the API endpoints directly in the background,Still nothing.


文章来源: https://infosecwriteups.com/how-i-escalated-privileges-from-user-to-admin-0e6aa72274fc?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh