webProeasy

Творение безумца (Work of a Madman)

hackerlab

Task: PHP application with source code provided. Solution: Found hardcoded credentials and exploited parse_str() query string injection to set admin role in session.

$ ls tags/ techniques/
Source code analysis for credential discoveryQuery string parameter injection via parse_str()Session role manipulationAuthentication bypass with hardcoded credentials

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups