webProeasy
Neighbour
tryhackme
Task: Web application with login form and profile page. Solution: Found guest credentials in HTML comments, logged in, then exploited IDOR vulnerability by changing user parameter in URL from guest to admin to access admin profile and retrieve flag.
$ ls tags/ techniques/
IDOR via URL query parameter manipulationHTML source code inspection for leaked credentialsSession-authenticated horizontal privilege escalation
π
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]ΠΠΎΡΡΡΠΏ Π·Π°ΠΏΡΠ΅ΡΡΠ½ (Access Denied)β hackerlab
- [web][Pro]Pryzhokβ hackerlab
- [web][Pro]Lab 15 β ProfileHub β IDOR in User Profile APIβ hackadvisor
- [web][Pro]SecretKeeperβ hackerlab
- [web][Pro]Lab 109 β TaskForge β IDOR in Account Settings APIβ hackadvisor