Tags: web 

Rating: 5.0

## Web - Door Lock

Description:

The door is open to all! See who is behind the admin door??

Author: **r3curs1v3_pr0xy**

Following the same format as the previous web challenge, we are back within our food based website.

![](20210905135636.png)

Here is the Login page within the site menu.

![](20210905135810.png)

This time we need to register and then sign in.

![](20210905150259.png)

Now we have full access to our profile.

![](20210905150432.png)

If you look closely, as I was using the built-in browser within ZAP, you can see in the URL that I have a Profile ID of 1357.

I initially checked the profiles of users 0 and 1 to see if I could access the admin profile, to no avail. I did try some additional random id numbers as I did not want to brute force the page as I thought this was not permitted.

However, once the challenge was finished I set up a ZAP fuzzer for 3000 id numbers.

![](20210905150943.png)

Opened fuzzer.

![](20210905151037.png)

Opened payloads.

![](20210905151125.png)

Generated number payload.

![](20210905151303.png)

Started the fuzzer. Once it was completed, I was able to review the complete list. One way would be to filter by "size response body" and look for the difference between ids.

![](20210905151616.png)

However as we were expecting a flag, I utilised the search using the HTTP Fuzz Results for the flag prefix - GrabCon.

![](20210905151847.png)

This came up with two hits, both with the id=1766.

```html
GET http://34.135.171.18/profile/index.php?id=1766 HTTP/1.1
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: https://34.135.171.18/login/index.php
Cookie: PHPSESSID=b5424674b8786e71d7ae5eb8bacb8bb7
Upgrade-Insecure-Requests: 1
Host: 34.135.171.18
```

Now all we need to do is either go to the webpage and amend the id or look at the ZAP response for that id, where we find the words and flag highlighted in red.

![](20210905152141.png)

Flag:
##### GrabCON{E4sy_1D0R_}

Original writeup (https://github.com/Kartibok/Capture-the-Flag/blob/master/competitions/grabcon/door_lock.md).