Back to Browse

Portswigger - Access Control - Lab #13 Referer based access control

949 views
Oct 16, 2024
9:12

Hello Hackers, in this video of Referer based access control. You will see how to exploit, discover and find senstive information based on application logic flow to leak for potential attacks from Burp Suite in a lab from Web Security Academy powered by Portswigger ⚠️ Subscribe to my channel ➡️ @popo_hack ⚠️ 0:00 - About the Lab 0:38 - About Referer Header 1:49 - Discover Admin account 2:45 - Test upgrade and downgrade function 6:01 - Upgrade user Wiener 🔍 About the Lab Lab: Referer-based access control Level: Practitioner This lab controls access to certain admin functionality based on the Referer header. You can familiarize yourself with the admin panel by logging in using the credentials administrator:admin. To solve the lab, log in using the credentials wiener:peter and exploit the flawed access controls to promote yourself to become an administrator. 🔗 Resources About Referer Header: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referer ✅ What to do ? 1. Log in using the admin credentials. 2. Browse to the admin panel, promote carlos, and send the HTTP request to Burp Repeater. 3. Open a private/incognito browser window, and log in with the non-admin credentials. 4. Browse to /admin-roles?username=carlos&action=upgrade and observe that the request is treated as unauthorized due to the absent Referer header. 5. Copy the non-admin user's session cookie into the existing Burp Repeater request, change the username to yours, and replay it. Thank you for watching my video, if you have any questions or any topics recommendation feel free to write them on the comment below 🙋 #WebSecurityAcademy #portswigger #vulnerability

Download

0 formats

No download links available.

Portswigger - Access Control - Lab #13 Referer based access control | NatokHD