当前位置:网站首页>Tryhackme Christmas challenge 2021 advance of cyber 3-day1-idor vulnerability, insecure access control vulnerability
Tryhackme Christmas challenge 2021 advance of cyber 3-day1-idor vulnerability, insecure access control vulnerability
2022-07-01 09:51:00 【Full stack programmer webmaster】
Hello everyone , I meet you again , I'm your friend, Quan Jun .
List of articles
The first day
There is a problem with the cargo system , Let's find a way to repair !
IDOR Loophole What is it? ?
Insecure Direct Object Reference, Unsafe direct object reference , Is a privilege control vulnerability , Similar to ultra vires loopholes , That is, users access information they should not access , For example, I can only view my own information , But I can access other people's data by modifying some parameters .
Where it usually appears
Inquire about get request
post The value of the form
Users here id It's hidden , If modified , It may lead to arbitrary user password modification vulnerability
cookies
cookie Generally, some encrypted strings are used , However, some junior programmers may use some simple plaintext to transmit information
Take the following example , It can be modified by user_id To get information about other users
Challenge
On
The system has been tampered with , There's a problem ( Although I didn't see it hhhh
After a look, there are four function pages , The fourth is in line with the loophole we want to learn this time
Be able to see in url There are parameters in
Try to modify this value , Modify to 9 Found the person who tampered with the system
Click on Revert The button enables the system to recover
Challenging questions
1. seek santa The location of , according to user_id The changes found santa that will do
2. and 1 The same way of thinking
3. ditto
4. Just order it all user_id by 9 Of Revert You can recover flag
Publisher : Full stack programmer stack length , Reprint please indicate the source :https://javaforall.cn/131772.html Link to the original text :https://javaforall.cn
边栏推荐
- Network partition notes
- mysql截取_mysql截取字符串的方法[通俗易懂]
- HMS Core音频编辑服务3D音频技术,助力打造沉浸式听觉盛宴
- High precision factorial
- JS prototype inheritance can only inherit instances, not constructors
- ESP8266 FreeRTOS开发环境搭建
- Wechat applet WebView prohibits page scrolling without affecting the implementation of overflow scrolling in the business
- 集成积木报表报错 org.apache.catalina.core.StandardContext.filterStart 启动过滤器异常
- 一个悄然崛起的国产软件,低调又强大!
- Apple amplification! It's done so well
猜你喜欢

Eat a rich woman's melon...

The latest masterpiece of Alibaba, which took 182 days to produce 1015 pages of distributed full stack manual, is so delicious

炒币,亏了1000万。

Dotnet console uses microsoft Maui. Getting started with graphics and skia

微信表情符号写入判决书,你发的OK、炸弹都可能成为“呈堂证供”

JS scope chain and closure

我喜欢两个男人。。。

新数据库时代,不要只学 Oracle、MySQL

Live broadcast management project

Construction of esp8266 FreeRTOS development environment
随机推荐
Ubuntu系统安装与配置MySQL
PHP 字符串与二进制相互转换
Meituan P4 carefully collated microservice system architecture design manual to see the world of microservice architecture
云原生到底是什么?它会是未来发展的趋势吗?
Live broadcast management project
SQL学习笔记(01)——数据库基本知识
Using closures to implement private variables
[unity shader] substitution of bool type in the property definition
奇怪,为什么ArrayList初始化容量大小为10?
Dspic30f6014a LCD block display
历史上的今天:九十年代末的半导体大战;冯·诺依曼发表第一份草案;CBS 收购 CNET...
Mikrotik Routeros Internet access settings
架构实战营 模块九:设计电商秒杀系统
SQL学习笔记(03)——数据约束关系
Flinkv1.13 implementation of financial anti fraud cases
tryhackme圣诞挑战2021-Advent of Cyber 3-day1-IDOR漏洞,不安全的访问控制漏洞
短路运算符惰性求值
【无标题】
button按钮清除边框
In terms of use