Neighbour

The first thing I notice in the description is that we’ll probably be able to find information about someone very easily. No deep digging required, and that’ll lead us somewhere interesting.


The URL drops us straight onto a login page.

I always check for default admin:admin credentials, especially when a room is listed as easy. Didn’t work this time. Something interesting though. You can log in as guest by pressing Ctrl + U, which opens the raw HTML page. There’s a comment sitting right in the source handing us the credentials:

guest:guest

Logging in as Guest

After logging in as guest, there’s nothing to view or interact with. That’s a strong hint that something’s going on with the URL. This is a classic case of IDOR (Insecure Direct Object Reference). A vulnerability where changing something like user_id=123 to user_id=124 lets you access someone else’s data because the server doesn’t properly check permissions.

Exploiting the IDOR

I swap guest for admin in the URL.

It works.

We’re now logged in as admin which in a real scenario would be extremely dangerous. The flag appears and the room is done!

Flag: flag{66be95c478473d91a5358f2440c7af1f}