OWASP top 10 vulnerabilities CTF lesson – Insecure Direct Object References

CTF365 lesson is based upon OWASP top 10 vulnerabilities which is still valid in 2020. The following are the lessons that are provided by CTF365. Let me tell you they are not only top 10, instead the list is of top 11 and please note they are not in any order. You can signup security shepherd using CTF365 account and start learning.

1. Broken Session Management
2. Cross Site Request Forgery (CSRF)
3. Cross Site Scripting (XSS)
4. Failure to Restrict URL Access
5. Insecure Cryptographic Storage
6. Insecure Direct Object References
7. Poor Data Validation
8. Security Misconfiguration
9. SQL Injection (SQLi)
10. Untrusted Input
11. Unvalidated Redirects and Forwards

6. Insecure Direct Object References

The short description has been given in the page itself but if you want to read more about it then you can always checkout the official OWASP page where they have described it more. Please click here to go to the link.

The task here is as follows

The result key to complete this lesson is stored in the administrators profile.

We will use burp here. Click on the “Refresh your Profile” and send POST request to the repeater.

See the username=guest, lets see what will be the HTTP response if we change it to admin and send the request.

The response is as the following

The result key is

Paste the key and complete the lesson

Leave a Reply

Your email address will not be published. Required fields are marked *