Hello and welcome to the cyber. Very secure coding course. My name is Sonny Wear, and this is a WASP top 10 for 2013 a two broken authentication and session management lab in solution.
This lab is going to be inside of web goat. The authentication flaws. Multi level log in one.
Now, please note that in this lab I'm actually going to use a Firefox plugin called Tamper Data.
You are free to use tamper data for this exercise as well. Or if you would like to use burp sweet as we've been using in other labs, you can certainly use that tool as well. Both will accomplish the same tasks.
This is the video solution forthe indication flaws. Multilevel log In one. It says stage wine. This state is just to show how a classic multi longan works. Your goal is to do a regular log Innes Jane with password Tarzan.
And you have the following Tan's so tan stands for transaction authorization number. So I'm gonna go ahead and long in as Jame.
The first transaction number I get assigned Is this.
So it says now you are a hacker who already has stolen some information from Jane by phishing e mail.
You have the password, which we know is Tarzan.
Ah, but the first tan has already been used, right? So? So I can't do any kind of session fixation on that particular number
unnecessarily that I know of. Um,
although I'm going to try it. So it says the problem is the first and has already used try to break into the system. Anyway,
if the programmer does not change or check for for the same used tan than possibly I could break ins and log out,
okay. And so tan, too has to be a valid number. But what I'm gonna do is go ahead and
And I was able to log in because there was no check
if a previous tan had been used.