Skip to content

Commit 73db98e

Browse files
committed
updating my blogs
1 parent dc284d8 commit 73db98e

File tree

1 file changed

+56
-0
lines changed

1 file changed

+56
-0
lines changed
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: User Role Controlled By Request Parameter
3+
description: In this lab, we are access the admin panel and delete the user Carlos.
4+
date: 2024-05-24 11:33:00 +0800
5+
categories: [Web Security Academy Labs]
6+
tags: [Access Control, Parameter]
7+
pin: true
8+
math: true
9+
mermaid: true
10+
image:
11+
path: https://static.vecteezy.com/system/resources/previews/025/463/773/non_2x/hacker-logo-design-a-mysterious-and-dangerous-hacker-illustration-vector.jpg
12+
alt: password-reset-poisoning
13+
---
14+
15+
***
16+
# Access Control
17+
## Lab #3: User Role Controlled By Request Parameter
18+
19+
Hola 👋 welcome back. This is the Lab 3# [User Role Controlled By Request Parameter](https://portswigger.net/web-security/learning-paths/server-side-vulnerabilities-apprentice/access-control-apprentice/access-control/lab-user-role-controlled-by-request-parameter) write-up of the Access Control labs on WebSec Academy. In this lab, we are access the admin panel and delete the user Carlos. Let's get started, friends!
20+
21+
![access-control](https://github.com/T3chnocr4t/T3chnocr4t.github.io/assets/115868619/233707e5-1d04-409f-b413-33766ae43a5b)
22+
23+
***
24+
### End Goal :#
25+
- Locating and accessing the admin panel via forgeable cookies.
26+
- And using it to delete the user carlos.
27+
28+
***
29+
### Testing For Vulnerabilities:
30+
31+
![2024-05-14_20-46](https://github.com/T3chnocr4t/T3chnocr4t.github.io/assets/115868619/e9c41aa4-c6e0-48c1-9c75-6f1f79674f34)
32+
33+
- Using Burp Suite, send the main page request to the Repeater tab to test for unprotected functionality to access the administrative functions. Browsing to the relevant admin URL, in this case, specifying `/admin` as the path, results in a 401 error, indicating "unauthorized."
34+
35+
![2](https://github.com/T3chnocr4t/T3chnocr4t.github.io/assets/115868619/87971693-c6e7-4a7b-8621-4f1bde58dfbb)
36+
37+
- Let's log in to our own account using the following credentials: wiener:peter. We'll use the proxy tab and turn on the intercept to modify a request. Let's see 👀.
38+
39+
![2024-05-15_00-05](https://github.com/T3chnocr4t/T3chnocr4t.github.io/assets/115868619/556ef814-caf8-4aa4-a975-0ad33c90811b)
40+
41+
- We can see that we are using the POST method (sending data to the server). We can send the request to the Repeater tab and modify it more effectively there.
42+
- Modify the request by changing the path to "/admin" and setting the cookie header value of "admin" from fasle ( admin=fasle indicates that the user associated with the cookie is not an administrator.) to true. And use the session to acces the admin panel. Sending this request should take us to the admin panel. Bingo 😂
43+
44+
![33](https://github.com/T3chnocr4t/T3chnocr4t.github.io/assets/115868619/7ac84be3-5336-4a30-88c6-d943af71c779)
45+
46+
- Checking the response source, we can identify the path to delete the user "Carlos." Upon following the redirection, we can proceed to delete the user "Carlos" and successfully complete the labs.
47+
48+
![7](https://github.com/T3chnocr4t/T3chnocr4t.github.io/assets/115868619/525e2ff8-de99-4a24-9432-ebd26e909a3e)
49+
50+
![9](https://github.com/T3chnocr4t/T3chnocr4t.github.io/assets/115868619/a6c16c12-3bda-471c-ac00-20a91b7cad5e)
51+
52+
And we complete our goal by accessing the admin panel and deleting the user "Carlos".
53+
54+
That's all, friends. Thank you for reading up to this point. I would like to hear your feedback on anything not clear here. Here is my Twitter account @[T3chnocr4t](https://twitter.com/T3chnocr4t). Feel free to DM me if you have any issues with my write-up. Thanks!
55+
56+
[Go Back Home](https://t3chnocr4t.github.io/)

0 commit comments

Comments
 (0)