This scenario provides a challenge to users who are expected to:
1. Identify the vulnerabilities with regards to access controls
2. Exploit the vulnerabilities and gain access to authenticated information
3. Perform privilege escalation in order to fully compromise the target
- This scenario contains one virtual machine.
- VPN Connection Required: Optional
- This lab can be completed by either connecting to the CR VPN or by simply utilizing the Web Proxy feature.
In order to benefit from this scenario it is recommended you have competence in the following areas:
1. Basic understanding of the HTTP protocol
2. How web applications work behind the scenes
3. How to use an HTTP Intercepting Proxy
About the Author
Marios holds a BSc Computer Science degree from Northumbria University and an MSc degree in Cyber Security from the University of York. He is one of the OWASP Cyprus Chapter Leaders and he is passionate about web application security. He likes to spend his free time mastering his backgammon skills.
- TIME45 MINUTES
- COST10 CRYSTALS