Hintru ENES ← All labs

Ottergram (BAC + HTTP Verb Tampering) — Bugforge

EN medium CTF challenge BACBroken Access ControlHTTP Verb TamperingIDORAuthorization BypassBurp Suite

Ottergram is a social-media-style web application on Bugforge.io where users browse otter photos. The attack chain is two-stage: first, find functionality you shouldn't be able to reach. Then, find a way past the gate that's supposed to stop you.

0/5
solved
👁 Step 1 Step 2 Step 3 Step 4 Step 5
enumeration

Step 2 · Discover Admin-Only Endpoints

Objective: Identify endpoints or functionality that are intended to be restricted to admin users only.

Context: You are authenticated as a standard user. The application likely has administrative endpoints that are not linked from the regular user UI but may still be accessible.

Progressive hints

Only reveal the ones you need. Claude tracks how many you used to calibrate the feedback.

Hint 1 — directional nudge

Look in the captured traffic for endpoints that reference admin roles, user management, or moderation. Try navigating to those paths directly — see how the server reacts.

Hint 2 — technique / vuln class

This is a Broken Access Control (BAC) scenario. Try accessing admin-related URL paths directly, or look for endpoints in the captured traffic that reference admin roles, user management, or moderation.

Hint 3 — near solution

Try navigating to paths such as /admin, /api/admin, /admin/users, or similar. Alternatively, look at the captured Burp requests for any endpoint that returns a 403 or redirects you away — those are your targets.

Your attempt