In this walk through, we will be going through the Session Management (Administrator Portals) vulnerability section from bWAPP Labs. We will be exploring and exploiting Session Management in Administrator Portals and learn how application are affected because of it. So, let’s get started with the Hacking without any delay.
Table of Contents
Security: Low
- Setting the security level to Low.
- The application has a admin panel however the page is locked. We intercepted the request via burpsuite and found out that it is issuing a GET request to smgmt_admin_portal.php file with parameter admin=0.
- Manipulated the admin parameter to 1 and got in.
admin = 1
Security: Medium
- Setting the security level to Medium.
- The application has a admin panel however the page is locked. We intercepted the request via burpsuite and found out that it is issuing a GET request to smgmt_admin_portal.php file with parameter admin=0 in the cookie value.
- Manipulated the admin parameter in cookie value to 1 and got in.
Security: High
- Setting the security level to High.
- We have already bypassed it. So, Cheer up!
Also Read: bWAPP – PHP Code Injection
Conclusion:
So, we finally completed all the security levels for the bWAPP Session Management (Administrator Portals) Vulnerability. We looked into the various ways how application has been set up in various levels and how we can bypass the security controls implemented. Session Management attacks can be mitigated by creating strong session management mechanisms, employing secure coding practices to mitigate XSS and other vulnerabilities and using multi-factor authentication (MFA) to add an extra layer of security. On that note, i will take your leave and will meet you in next one with another bWAPP vulnerability writeup, till then “Keep Hacking”.