OWASP Security Shepherd Project - Session Management Challenge 8 (Session Management Challenge)

Challenge

Solution

    Click the Privileged User Only Button ->

      Check Burp for packet send ->
There is an adminDetected parameter sent & a challengeRole cookie added.

    Try making the adminDetected as true ->
We could now pretty much sure that they use challengeRole as a check method for admin.

    Bad news is we have no idea what is LmH6nmbC. By trying out the decoders online, we will notice that ATOM-128 decryption of LmH6nmbC is guest!

    Let's use admin's ATOM-128 encryption -> KiA9MiNC.
We will get a response <!-- Invalid Role Detected -->

    We must find another user account which is valid. It turns out that the answer is superuser -> nmHqLjQknlHs.


Reference

CBA.pl (encrypt/decrypt online tools) - http://k4.cba.pl/dw/crypo/tools/eng_atom128c.html




留言

The Hottest Articles

OWASP Security Shepherd Project - My Practice & Solutions

OSCP回顧 & 準備建議

OWASP Security Shepherd Project - SQL Injection 3 (Injection Challenge)