当前位置:网站首页>Tryhackme Christmas challenge 2021 advance of cyber 3-day1-idor vulnerability, insecure access control vulnerability
Tryhackme Christmas challenge 2021 advance of cyber 3-day1-idor vulnerability, insecure access control vulnerability
2022-07-01 09:51:00 【Full stack programmer webmaster】
Hello everyone , I meet you again , I'm your friend, Quan Jun .
List of articles
The first day
There is a problem with the cargo system , Let's find a way to repair !
IDOR Loophole What is it? ?
Insecure Direct Object Reference, Unsafe direct object reference , Is a privilege control vulnerability , Similar to ultra vires loopholes , That is, users access information they should not access , For example, I can only view my own information , But I can access other people's data by modifying some parameters .
Where it usually appears
Inquire about get request
post The value of the form
Users here id It's hidden , If modified , It may lead to arbitrary user password modification vulnerability
cookies
cookie Generally, some encrypted strings are used , However, some junior programmers may use some simple plaintext to transmit information
Take the following example , It can be modified by user_id To get information about other users
Challenge
On
The system has been tampered with , There's a problem ( Although I didn't see it hhhh
After a look, there are four function pages , The fourth is in line with the loophole we want to learn this time
Be able to see in url There are parameters in
Try to modify this value , Modify to 9 Found the person who tampered with the system
Click on Revert The button enables the system to recover
Challenging questions
1. seek santa The location of , according to user_id The changes found santa that will do
2. and 1 The same way of thinking
3. ditto
4. Just order it all user_id by 9 Of Revert You can recover flag
Publisher : Full stack programmer stack length , Reprint please indicate the source :https://javaforall.cn/131772.html Link to the original text :https://javaforall.cn
边栏推荐
- Dspic30f6014a LCD block display
- The "China Mobile Chain" state secret engine was officially launched on BSN
- Differences between JS valueof and toString
- Voice service notes
- Flinkv1.13 implementation of financial anti fraud cases
- Concept of digital currency
- 这样理解mmap,挺有意思!
- PHP code audit and File Inclusion Vulnerability
- [untitled]
- 微信表情符号写入判决书,你发的OK、炸弹都可能成为“呈堂证供”
猜你喜欢

dotnet 控制台 使用 Microsoft.Maui.Graphics 配合 Skia 进行绘图入门

The market is relatively weak recently

Spark's action operator

I like two men...

Introduction to expressions and operators in C language

Live broadcast management project

直播管理项目

主流实时流处理计算框架Flink初体验

Wechat emoticons are written into the judgment, and the OK and bomb you send may become "testimony in court"

IPv6 learning notes
随机推荐
The "China Mobile Chain" state secret engine was officially launched on BSN
Solution of EPS image blur by latex insertion
Comparison between Oracle JDK and openjdk
SQL learning notes (03) -- data constraint relationship
[unity rendering] customized screen post-processing
High precision factorial
[unity shader] substitution of bool type in the property definition
苹果放大招!这件事干的太漂亮了……
LVGL V8.2字符串显示在Keil MDK上需要注意的事项(以小熊派为例)
PO模式深入封装
Initial experience of Flink, a mainstream real-time stream processing computing framework
编写自己的who命令
How Kolo enables NFT music industry
【leetcode】287. Find duplicates
Eat a rich woman's melon...
Ubuntu system installation and MySQL configuration
121. thread scheduling: join() method and yield() method
ES6 const essence and completely immutable implementation (object.free)
直播管理项目
超标量处理器设计 姚永斌 第4章 分支预测 --4.1 小节摘录