In this lab we need to modify the serlialized session which is vulnerable to authentication bypass through which we can get access to administrator account
<imgsrc="https://i.imgur.com/S787FVy.png"/>
We can login as `wiener` with the given password `peter`
<imgsrc="https://i.imgur.com/1KdYJpy.png"/>
<imgsrc="https://i.imgur.com/3lGZIrk.png"/>
The session cookie can be accessed from developer tools which is base64 encoded
To understand what's happening in serialized cookie here,
-`O:4` represents the object `user` which is length of `4` and has two attirbutes `2` which are `username` and `acces_token`
-`s:8` represents the username attirbute of string type having length of `8` which has the key value `winener` of string data type having length of `6`
-`s:12` represents the `acess_token` of string type having length of 12 which has key value of string data type of lenght `32`
We can try replacing the session cookie with the username `admnistrator` also we should edit the length of string also we can try performing php loose comparision which is comparing string with an integer value `0`
On replacing the token we'll see an error message which will reveal some access tokens and there are 3 tokens so they are probably for carlos, wiener and administrator