This lab uses a serialization-based session mechanism and is vulnerable to authentication bypass as a result. To solve the lab, edit the serialized object in the session cookie to access the
administrator account. Then, delete Carlos.
You can log in to your own account using the following credentials:
To access another user's account, you will need to exploit a quirk in how PHP compares data of different types.
administratorand update the length of the attribute to
0. Remember to update the data type label by replacing
i. The modified object should look like this:
administratoraccount and delete Carlos.