Writeup-CTF
  • CTF events
    • DamCTF-2021
    • N1CTF 2021
    • WANNAGAME CHAMPIONSHIP2021
      • After end
    • DefCamp CTF 21-22
  • Root-me
    • SQL Injection - Filter bypass
    • GraphQL
    • JSON Web Token (JWT) - Public key
    • LDAP injection - Blind
    • Python - Blind SSTI Filters Bypass
    • SQL Injection - Filter bypass
    • SQL Truncation
    • Page 1
    • [Root-me]PHP - Unserialize overflow
  • WebGoat
    • Injection
    • XXE
    • Broken Authentication
      • JWT Token
      • Password reset
    • Sensitive Data Exposure
      • Insecure login
    • Broken Access Control
      • Insecure Direct Object References
    • Cross Site Scripting (XSS)
    • Cross site request forgery
      • Cross-Site Request Forgeries
      • Server-Side Request Forgery
    • Client site
      • Client site filtering
      • Bypass front-end restrictions
      • HTML tampering
    • Insecure Deserialization
    • Vulnerable Components
    • Challenges
      • Admin lost password
      • Without password
      • Without account
Powered by GitBook
On this page
  • 2/ Authenticate First, Abuse Authorization Later
  • 3/ Observing Differences & Behaviors
  • 4/ Guessing & Predicting Patterns
  • 5/ Playing with the Patterns
  1. WebGoat
  2. Broken Access Control

Insecure Direct Object References

PreviousBroken Access ControlNextCross Site Scripting (XSS)

Last updated 3 years ago

2/ Authenticate First, Abuse Authorization Later

Just login with available username and password (tom-cat)

3/ Observing Differences & Behaviors

The different things that not show are userId and role

4/ Guessing & Predicting Patterns

Click submit, open devtool - network, you will see path:

Replace alt-path with userId in last challenge, you can solve this challenge:

5/ Playing with the Patterns