labs
Lab - 1: Unprotected admin functionality (A)
This lab has an unprotected admin panel. Solve the lab by deleting the user carlos.
There is an unprotected route at
/administration-panel
Lab - 2: Unprotected admin functionality with unpredictable URL (A)
This lab has an unprotected admin panel. It's located at an unpredictable location, but the location is disclosed somewhere in the application.
Solve the lab by accessing the admin panel, and using it to delete the user carlos.
Found a script that contain admin route.
Lab - 3: User role controlled by request parameter (A)
This lab has an admin panel at /admin, which identifies administrators using a forgeable cookie. Solve the lab by accessing the admin panel and using it to delete the user carlos. You can log in to your own account using the following credentials: wiener:peter
login with wiener and change the cookie
Admin: false
toAdmin: true
Lab - 4: User role can be modified in user profile (A)
This lab has an admin panel at /admin. It's only accessible to logged-in users with a roleid of 2. Solve the lab by accessing the admin panel and using it to delete the user carlos. You can log in to your own account using the following credentials: wiener:peter
this lab is not realistic
login with wiener. Change the account email and with POST request, add roleid.
Then admin panel will appear.
Lab - 5: URL-based access control can be circumvented (P)
This website has an unauthenticated admin panel at /admin, but a front-end system has been configured to block external access to that path. However, the back-end application is built on a framework that supports the X-Original-URL header.
Lab - 6: Method-based access control can be circumvented (P)
This lab implements access controls based partly on the HTTP method of requests. You can familiarize yourself with the admin panel by logging in using the credentials administrator:admin.
To solve the lab, log in using the credentials wiener:peter and exploit the flawed access controls to promote yourself to become an administrator.
login as administrator and upgrading the user as admin goes through this route
Login as wiener from a private browser and copy its session cookie and test the above POST method and return 401 response. If the POST method is changed to POSTX method,
"Missing parameter 'username'"
will be got.change the request method and send that request and carlos will be upgraded.
Lab - 7: User ID controlled by request parameter (A)
This lab has a horizontal privilege escalation vulnerability on the user account page. To solve the lab, obtain the API key for the user carlos and submit it as the solution. You can log in to your own account using the following credentials: wiener:peter
found one endpoint
change the
id
parameter value
Lab - 8: User ID controlled by request parameter, with unpredictable user IDs (A)
found on endpoint with id
search for other user's id and found in one blog post
Lab - 9: User ID controlled by request parameter with data leakage in redirect (A)
use Burp repeater and use endpoint
/my-account?id=carlos
though it is redirect, in Burp response, it contains API key.
Lab - 10: User ID controlled by request parameter with password disclosure (A)
This lab has user account page that contains the current user's existing password, prefilled in a masked input. To solve the lab, retrieve the administrator's password, then use it to delete carlos. You can log in to your own account using the following credentials: wiener:peter
Login with wiener
password is shown at my-account page
at
/my-account?id=wiener
change to/my-account?id=administrator
Lab - 11: Insecure direct object references (A)
This lab stores user chat logs directly on the server's file system, and retrieves them using static URLs
at
/chat
page, download button makes GET request from `/download-transcript/2.txt'try to download the
/download-transcript/1.txt
Lab - 12: Multi-step process with no access control on one step (P)
This lab has an admin panel with a flawed multi-step process for changing a user's role. You can familiarize yourself with the admin panel by logging in using the credentials administrator:admin. To solve the lab, log in using the credentials wiener:peter and exploit the flawed access controls to promote yourself to become an administrator.
Changing the role of admin takes two steps.
First step,
Second step to confirm which is vulnerable
Lab - 13: Referer-based access control (P)
This lab controls access to certain admin functionality based on the Referer header. You can familiarize yourself with the admin panel by logging in using the credentials administrator:admin. To solve the lab, log in using the credentials wiener:peter and exploit the flawed access controls to promote yourself to become an administrator.
GET request with
wiener
account.
Last updated