Intrusionz3r0
HacktheboxTwitter
  • Welcome
  • Windows Penetration Testing
    • Enumeration
    • Credentials Attacks On Windows
    • Kerberos
    • Abuse ACLS
    • Common Attacks
    • Abuse Tokens
    • Kerberos “Double Hop”
    • Privileged Groups
    • Defense Evasion
    • Active Directory Certificate Services
    • Windows Persistence
    • Privilege Escalation
    • Trust Enumeration and Attacks
    • Windows Lateral Movement
    • Powershell Cheetsheet
    • Microsoft Exchange and Office
  • Linux Penetration Testing
    • Linux Active directory
    • Tools
    • Privilege Groups
    • Post Exploitation
    • Privilege Escalation
      • Sudo Privilege escalation
      • Writable .service files
      • Wildcard on compression binaries
      • Path Abuse
      • Capabilities
      • Exploit Logrotate
      • Weak NFS Privileges
      • Hijacking Tmux Sessions
      • Shared Libraries
      • Shared Object Hijacking
      • Python Library Hijacking
      • Linux Enumeration
    • Stealing Linux Credentials
    • Critical Vulnerabilities
    • Upgrading TTY
    • Process monitoring
    • Miscellaneous
    • Escape Restricted Shell
  • Malware Development
    • Malware Development Essentials
    • Code Snippets
    • Malware Development Intermediate
  • Social Engineering
  • Portforwarding and tunneling
  • File Transfer Techniques
  • Password Attacks
  • Enumeration
    • Network Enumeration
    • (OSINT) Active Enumeration
    • (OSINT) Passive Enumeration
    • [22] SSH
    • [21] FTP
    • [25,465,587] SMTP
    • [53] DNS Enumeration
    • [80 443] HTTP HTTPS
    • [110,143,993,995] IMAP/POP3 Enumeration
    • [111,2049] Network File System
    • [139,445] SMB Enumeration
    • [161] SNMP
    • [512,513,514] R-Services
    • [623] IPMI
    • [873] Rsync
    • [1433] MSSQL
    • [1521] Oracle TNS
    • [3389] Remote Desktop Protocol (RDP)
    • [5985/5986] WinRM
    • [3306] Mysql
    • [513] Rlogin
  • Hacking Web
    • Methodology
    • Vulnerabilities
      • SQL Injection
      • Cross Site Scripting (XSS)
      • File path traversal/Local File Inclusion
      • File Upload Attacks
      • Denial of Service
      • Command Injection
      • Insecure Direct Object Reference (IDOR)
      • XML External Entity (XXE) Injection
      • Web Mass Assignment Vulnerabilities
      • Log4Shell Exploitation Guide
      • Authentication
      • Business Vulnerabilities
      • Access control vulnerabilities
      • Server-Side Request Forgery (SSRF)
      • Cross-site request forgery (CSRF)
      • Cross-origin resource sharing (CORS)
      • Clickjacking
      • DOM-based vulnerabilities
      • JWT vulnerabilities
      • Password reset poisoning
    • Web Tech Detection viaa Tokens, Headers & Cookies
    • Burpsuite through SOCKS5
    • Bypass 403 - Forbidden
  • OSINT
  • Common Applications
    • Gitlab
    • Splunk
    • Tomcat
    • Joomla
    • Microsoft Internet Information Services (IIS)
    • Nagios XI
    • Wordpress
    • Drupal
    • Tomcat CGI
    • osTicket
    • Attacking Thick Client Applications
    • PRTG Network Monitor
    • Jenkins
    • ColdFusion
    • WebLogic
    • Grafana
    • Umbraco
  • Containers Pentesting
  • C2 Command and Control
    • Sliver
    • Cobalt Strike
    • Mythic
    • Havoc
  • Report Templates
  • Anonymity Guide
  • Labs
    • Vulnlabs
      • Baby
      • Trusted (Chain)
      • Retro
      • Retro2
      • Hybrid (Chain)
      • Baby2
      • Breach
      • Sendai
      • Sweep
      • Delegate
      • Redelegate
      • Media
      • Bruno
      • Cicada
      • Lustrous2
      • Tengu (Chain)
      • Reflection (Chain)
      • Tea (Chain)
      • Heron (Chain)
      • Lustrous (Chain)
      • Kaiju (Chain)
      • Intercept (Chain)
      • Sidecar (Chain)
      • Vigilant (Chain)
      • Job
      • Job2
      • Puppet (Chain)
      • Mythical (Chain)
      • Push (Chain)
Powered by GitBook
On this page
  1. Hacking Web
  2. Vulnerabilities

Access control vulnerabilities

Access control flaws occur when an application fails to properly restrict access to resources or functionalities based on the user's identity or role. These issues can lead to horizontal or vertical privilege escalation.


🔎 Common Testing Techniques

1. Accessing the Admin Panel

  • Try visiting /admin, /admin/dashboard, /admin-panel, etc.

  • If you’re logged in as a regular user and can access it, access control is broken.

  • Even if blocked, test bypass via headers:

X-Original-URL: /admin

Example:

POST /?userid=1 HTTP/1.1
Host: target.com
X-Original-URL: /admin/deleteUser

2. Modifying HTTP Methods

Some endpoints may enforce access control only for certain HTTP verbs.

  • Try changing GET to POST, PUT, DELETE, etc.

Example:

DELETE /admin-roles HTTP/2
username=username&action=upgrade

3. Privilege Escalation via Insecure Parameter Handling

If administrators can change user roles and the request isn't properly restricted:

  • Intercept requests like role upgrades

  • Modify parameters and replay the request as a normal user


4. Bypassing with Referer Header

Some apps use Referer as a weak form of authorization.

Example:

GET /admin-roles?username=wiener&action=upgrade HTTP/1.1
Host: target.web-security-academy.net
Referer: https://target.web-security-academy.net/admin

⚠️ This header is fully user-controlled and should never be trusted for authorization.


5. Hidden Role-Based Parameters

When changing user attributes (name, email, password), intercept the request and look for hidden or backend-only fields.

Example:

jsonCopyEdit{
  "username": "wiener",
  "email": "test@example.com",
  "roleid": 1
}
  • Try modifying roleid, isAdmin, group, etc.

  • Append such parameters if not originally included in the request.


6. Information Disclosure via Source or JS Files

  • Review JavaScript files and source code for:

    • Hidden endpoints

    • Sensitive roles/flags

    • API keys or debug routes


7. Access Control via Cookies

Analyze how the session or role is enforced:

  • Cookies like isAdmin=true, userType=1, etc.

  • Tamper and test their effect


9. Fuzzing Parameters for Enumeration

Perform parameter fuzzing to discover:

  • Hidden user IDs

  • Privileged accounts

  • Misconfigured access logic

PreviousBusiness VulnerabilitiesNextServer-Side Request Forgery (SSRF)

Last updated 2 months ago