1. Initial Reconnaissance — Understanding the Objective

Upon accessing the application, the goal was clearly stated: eliminate the administrator.

This immediately suggested that the challenge would likely involve:

  • Privilege escalation
  • Authorization bypass
  • Parameter manipulation

Instead of randomly testing inputs, the approach was logic-driven: If the goal is to eliminate the admin, then we must find how accounts are deleted and determine whether that process can be manipulated.

None

2. Registration and Behavioral Observation

The application provided a typical:

  • Registration page
  • Login page

The first step was registering a normal user account and logging in.

None
None

After authentication, the interface displayed user-related functionality, including account management options. From here, a critical observation emerged:

  • There was a deletion feature.
  • The application allowed users to trigger deletion requests.
  • No obvious role restrictions were enforced in the UI.
None

This led to a working hypothesis:

If the application does not properly validate ownership or authorization during account deletion, it may be possible to delete another user — including the administrator.

3. Traffic Interception Using Burp Suite

To validate this hypothesis, the next step was intercepting HTTP requests using Burp Suite.

Action Performed:

Attempted to delete the logged-in account while intercepting the outgoing request.

None

Observation:

The deletion request contained a parameter:

userid=<value>

This was the critical finding.

The userid parameter determined which account the server would delete.

At this stage, a security question became central:

Does the server verify that the authenticated user actually owns the userid being deleted?

If not, this would indicate an Insecure Direct Object Reference (IDOR) vulnerability.

4. Exploitation — Parameter Manipulation

Most web applications assign:

  • userid=1 → Admin
  • userid=2+ → Regular users

After intercepting the deletion request in Burp Suite:

  1. The original userid value (assigned to the test account) was identified.
  2. The value was modified manually to:
userid=1

3. The modified request was forwarded to the server.

None

Result:

The challenge returned the flag, confirming completion.

None

5. Vulnerability Analysis

The root issue was:

Insecure Direct Object Reference (IDOR)

The application:

  • Trusted user-supplied input (userid)
  • Did not validate ownership
  • Did not enforce proper authorization checks on the backend

Instead of verifying:

Is the requester authorized to delete this specific account?

The server simply executed the deletion based on the provided ID.

This represents a classic broken access control vulnerability.

6. Exploitation Flow Summary

Step 1 — Understand the Goal

Eliminate the admin.

Step 2 — Explore Application Functionality

Register and log in as a normal user.

Step 3 — Identify Sensitive Actions

Locate the account deletion feature.

Step 4 — Intercept HTTP Traffic

Use Burp Suite to capture the deletion request.

Step 5 — Identify Controllable Parameters

Discover the userid parameter.

Step 6 — Modify and Exploit

Change userid to 1.

Step 7 — Achieve Objective

Admin account deleted. Flag retrieved.