Access the lab

Part-1

  1. click on this OWASP WEBGOAT
    attachments/Pasted image 20250314110934.png
  1. login by using username : guest ; password : guest
    attachments/Pasted image 20250314110952.png

  2. attachments/Pasted image 20250314110724.png

  3. attachments/Pasted image 20250314110739.png

  4. after login-> view profile
    attachments/Pasted image 20250314111018.png

  1. intercept on -> refresh this view profile page after login → go to burp and send to repeater

  2. edit the employee id form 101 to 102→ then click on SEND
    attachments/Pasted image 20250314111150.png

  3. do right click → show response in browser → open the link the burp's browser's new TAB.
    attachments/Pasted image 20250314111205.png

  4. we can see we logged in as larry , now after edting the employee id we logged in as MODE STOOGE.
    attachments/Pasted image 20250314111220.png

Conclusion


Part-2

  1. go to owasp webGoat
    attachments/Pasted image 20250314112412.png

  2. go insecure config→ forced browsing → intercept on → then refresh the page
    attachments/Pasted image 20250314112428.png

  3. send to intruder
    attachments/Pasted image 20250314112445.png

  4. edit the highlighted part → attack type : sniper → add and the file name part i.e sonia
    attachments/Pasted image 20250314112503.png

  1. then go to Payloads section → then select the add from list → filesname short → directories short ,short → directories short
    attachments/Pasted image 20250314112555.png

attachments/Pasted image 20250314112611.png

  1. start attack

  2. we got the configuration file at status code 302( which stands for redirection).
    attachments/Pasted image 20250314112651.png

  3. 302 → stands for redirection → then send to repeater and go to repeater section
    attachments/Pasted image 20250314112710.png

  4. send → follow redirection
    attachments/Pasted image 20250314112725.png

  5. show response in browser → copy the url and paste and hit it in the burp's suite ;s browser.
    attachments/Pasted image 20250314112740.png

  6. then run the url in browser so aunthenticated user got the access of admin.
    attachments/Pasted image 20250314112750.png

Conclusion