Using the OWASP Mutillidae II application and Burp's Proxy's Unhide hidden form fields feature, we'll determine whether manipulation of a hidden form field value results in gaining access to unauthorized data.
Using the OWASP Mutillidae II application and Burp's Proxy's Unhide hidden form fields feature, we'll determine whether manipulation of a hidden form field value results in gaining access to unauthorized data.