lab1: Unprotected admin functionality
访问robots.txt

进了删除即可
lab2: Unprotected admin functionality with unpredictable URL

访问admin-d0qwj5

lab3: User role controlled by request parameter

发现Cookie中存在判断是否为admin

lab4: User role can be modified in user profile
在change emil处发现可能可以修改role id


lab5: URL-based access control can be circumvented
如果框架支持用请求头重写请求行 就可能导致访问控制的绕过


此时点击删除 报access denied
考虑重写

lab6: Method-based access control can be circumvented
先用admin的账号抓包

切换为GET方式访问 回显缺少参数 补全

这里的Cookie是wiener的 回去看 发现wiener已经是admin了
还有一些访问控制出现在匹配严格问题上
如大小写 后缀是否有/ 任意扩展名
lab7: User ID controlled by request parameter

lab8: User ID controlled by request parameter, with unpredictable user IDs

通过carlos的文章得到其uuid

lab9: User ID controlled by request parameter with data leakage in redirect

通过id传carlos 发现先访问到该页面 然后再重定向回登录界面

lab10: User ID controlled by request parameter with password disclosure
user account处改id可以查看admin信息

在修改密码出有明文密码传输

提供了一个下载聊天记录的功能 发现当前下载的是2.txt
尝试直接下载1.txt

lab12: Multi-step process with no access control on one step
多步的访问控制 忽略了其中一步
在提升等级的时候需要二次验证
在第二步的时候访问控制没做好 可以直接提升用户等级

lab13: Referer-based access control
基于referer的访问控制 只验证了是否来自xxx
例如nacos
