arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

Python - Client Side Restriction Bypass

hashtag
Running the app on Docker

circle-check

Now that the app is running let's go hacking!

hashtag
Reconnaissance

The app allows us to select a number between 3 and 13 from the number input form. Let's also try typing numbers outside that interval directly into the field.

hashtag
Exploitation

We could intercept and modify the request on Burp:

Or alternatively, use devtools to modify the client-side restrictions directly:

And goal achieved! We could bypass the client-side restrictions.

hashtag
Additional sources

$ sudo docker pull blabla1337/owasp-skf-lab:client-side-restriction-bypass
$ sudo docker run -ti -p 127.0.0.1:5000:5000 blabla1337/owasp-skf-lab:client-side-restriction-bypass
C5: Validate All Inputs - OWASP Top 10 Proactive Controlsowasp.orgchevron-right
Logo