CYBER LAB
🏠 Home 📊 Progress 🏆 Badges
PLAYER: player1 | XP: 500 | LEVEL: 4

MISSION 1 — URL PARAMETER MANIPULATION (BROKEN ACCESS CONTROL)

Real-World Scenario:

Many websites use URL parameters to decide what content to show. For example:

example.com/profile.php?user=123

This might load a specific user's profile from the database.


The Problem:

If the application does NOT properly validate or restrict this input, a user could simply change the value in the URL to access something they shouldn't.

Example attack:

?user=124 → view another user's profile ?page=admin → access admin panel

Why this is dangerous:

  • Users can manipulate application behavior
  • Hidden or restricted pages can be accessed
  • No authentication or authorization checks are enforced

Industry Reference:

This issue falls under Broken Access Control in the OWASP Top 10.

Learn more: OWASP Top 10

Start Simulation