How to do it...

  1. From the Mutillidae menu, select OWASP 2013 | A4 – Insecure Direct Object References | Source Viewer:

  1. From the Source Viewer page, using the default file selected in the drop-down box (upload-file.php), click the View File button to see the contents of the file displayed below the button:

  1. Switch to Burp's Proxy | HTTP history tab. Find the POST request you just made while viewing the upload-file.php file. Note the phpfile parameter with the value of the file to display. What would happen if we change the value of this parameter to something else?

  1. Let's perform an IDOR attack by manipulating the value provided to the phpfile parameter to reference a file on the system instead. For example, let's try changing the upload-file.php value to ../../../../etc/passwd via Burp's Proxy | Intercept functionality.
  2. To perform this attack, follow these steps.
    1. Switch to the Proxy |Intercept tab, and press the Intercept is on button.
    2. Return to the Firefox browser and reload the login page. The request is paused and contained within the Proxy | Intercept tab.
    1. As the request is paused, change the value assigned to the phpfile parameter to the value ../../../../etc/passwd instead:

  1. Click the Forward button. Now press the Intercept is on button again to toggle the intercept button to OFF (Intercept is off).
  1. Return to the Firefox browser. Notice we can now see the contents of the /etc/passwd file!

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.188.142.146