{% extends 'introduction/base.html' %} {% block content %} {% block title %} Broken Access Control {% endblock %}

Broken Access Control

What is Broken Access Control

Access control, sometimes called authorization, is how a web application grants access to content and functions to some users and not others. These checks are performed after authentication, and govern what ‘authorized’ users are allowed to do. A web application’s access control model is closely tied to the content and functions that the site provides. In addition, the users may fall into a number of groups or roles with different abilities or privileges. Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification, or destruction of all data or performing a business function outside the user's limits. Common access control vulnerabilities include:

This lab helps us to understand one of the authentication flaws which leads to an attacker gaining unauthorized control of an account. On accessing the lab the user is provided with a simple login in page which requires a username and password.
The credentials for the user Jack is jack:jacktheripper.
Use the above info to log in.
The main aim of this lab is to login with admin privileges to get the secret key.

Exploiting the Broken Access

  • Every time a valid user logs in,the user session is set with a cookie called admin
  • When you notice the cookie value when logged in as jack it is set to 0
  • Use BurpSuite to intercept the request change the value of the admin cookie from 0 to 1
  • This should log you in as a admin user and display the secret key



This lab helps us to understand one of the authentication flaws which leads to an attacker gaining unauthorized control of an account.
The credentials for the user Jack is jack:jacktheripper.
Use the above info to log in.
The main aim of this lab is to login with admin privileges to get the secret key.

Exploiting the Broken Access

    • Log in Using the credentials provided above
    • Search for information lying around in the source files
    • You'll find out that user agent needs to be pygoat_admin
    • Use BurpSuite to intercept the request and change headers User-Agent to value pygoat_admin



user : admin
password : admin_pass
this is the admin credential
and
user : John
password : reaper
this is regular user credential
can u get access to admin page contents using regular user credentials or without credentials ?


Mitigation

{% endblock %}