Predictable Authentication
Reconnaissance

Exploitation
It seems that the only parameter which takes care of which private space we are shown is the userID. Now we will try different possibilities for the userID by changing the number to similar ones:
Lets try with user
As you can see we got access to another user's account whose ID was 02. This proves the weak mechanism of sessions management implemented here. Thanks to it, we can get all the user's private information. In this case this allow us to get admin credentials for the website.
We could keep trying to discover other resources for useful information. Let's try to explore other accounts like user01.
Last updated