OWASP Security Shepherd Project - Session Management Challenge 8 (Session Management Challenge)
Challenge
Solution
Click the Privileged User Only Button ->Check Burp for packet send ->
There is an adminDetected parameter sent & a challengeRole cookie added.
Try making the adminDetected as true ->
We could now pretty much sure that they use challengeRole as a check method for admin.
Bad news is we have no idea what is LmH6nmbC. By trying out the decoders online, we will notice that ATOM-128 decryption of LmH6nmbC is guest!
Let's use admin's ATOM-128 encryption -> KiA9MiNC.
We will get a response <!-- Invalid Role Detected -->
We must find another user account which is valid. It turns out that the answer is superuser -> nmHqLjQknlHs.
留言
張貼留言
Welcome to share your comments or questions : -)
Enjoy life!