Objective

This lab's two-factor authentication is vulnerable due to its flawed logic. To solve the lab, access Carlos's account page.

  • Your credentials: wiener:peter
  • Victim's username: carlos

You also have access to the email server to receive your 2FA verification code.

Solution

Once after login with the wiener user… It says us to enter the 4 digit code which we recieved through our email client

Checking the email client, we can confirm that we have received our 4 digit code

Now entered some random code on to OTP page and intercepted the request.. Then after changed value inside the cookie from verify=wiener to verify=carlos because our target is to get logged in as carlos and started the bruteforce attack for the four digit pin

And placeholder is set to mfa=$$ and then payload type is numbers from 0000 to 9999

Once after identifying the code with 302 and opening the response on to the browser that solves the lab