当前位置:网站首页>[Mozhe Academy] Identity Authentication Failure Vulnerability Actual Combat
[Mozhe Academy] Identity Authentication Failure Vulnerability Actual Combat
2022-07-30 06:34:00 【Wanfeng 129】
We can see a login platform when we enter the shooting range. Only one login account and password test/test are given below. Try to log in
Log in to see personal information, but no clues are found. We try BurpSuite to capture packets for more information
We found two packets, from the second we can find card_id=20128880322
We can find that this is the same as the membership number, guess it is to output each person's personal information according to the membership number
We use the attack module to blast this id
Add the last two numeric variables to try to blast
Set the value as the attack load, the range is 1-99, each time increases by 1
Determine which numbers have personal information based on their lengths
View the source code of the login interface and find that Ma Chunsheng's id is 16, we continue to go back to the attack module to check the response packet of 16
It can be found that the account number is m233241, and the password is MD5 encrypted. We decrypt it and get 9732343
Try to log in with your account and password
Sign in successfully and get key
Thoughts
Be sure to carefully discover some parameters in the data package, and then use what you have learned to try to find breakthrough points
Summary
Broken Access Control (BAC) is a common vulnerability in Web applications.OWASP ranks second in the top ten security risks of web applications.
This vulnerability refers to a flaw in the application's authorization check, allowing an attacker to bypass the permission check in some ways after obtaining a low-privileged user account, access or operate otheruser or higher.The reason for the unauthorized vulnerability is mainly because developers over-trust the data requested by the client when adding, deleting, modifying, and querying data, and omit the judgment of permissions.Unauthorized access vulnerabilities are mainly divided into horizontal unauthorized access and vertical unauthorized access.
Repair defense plan
1. The front and back ends simultaneously verify the user input information, double verification mechanism
2. Verify that the user has permission to call the relevant function before calling the function
3. Before performing key operations, the user's identity must be verified to verify whether the user has permission to operate data
4. Encrypted resource ID of direct object reference to prevent attackers from enumerating IDs and specializing sensitive data
5. Never trust input from users, and strictly check and filter controllable parameters
边栏推荐
猜你喜欢
随机推荐
目前主流浏览器以及对应的内核
div设置一个最小高度和最大高度,但是中间可以靠内容撑开
0基础玩转C语言—初识C语言(下)
npm install和npm install --save
你怎么看待scanf()中%d的“吃空白”行为?
volatility内存取证----命令演示
node中对文件的基本操作
BaseDAO的抽取
cJSON开源项目详细解剖
CTF之misc-图片隐写
‘kaggle视频游戏销售数据的可视化和分析‘项目实现
人生的第一篇博客(初识代码)
C语言人机大战之三字棋博弈
FastAPI Quick Start
vulnhub-XXE ctf安全真题
php实现数据库的增删查改操作-教务管理系统
npm基本使用
FastAPI 快速入门
P3 元宝第六单元笔记
记一次Mailpress插件RCE漏洞复现