Corridor

Corridor - TryHackMe

Overview

Corridor is a beginner-level web challenge that simulates a simple yet realistic scenario of an Insecure Direct Object Reference (IDOR) vulnerability. The user is placed in a digital corridor with multiple doors, each linked via a unique hashed identifier. By examining and manipulating these identifiers, unauthorized access can be achieved — ultimately leading to the discovery of a hidden flag.


Key Objectives

  1. Analyze the structure and behavior of the web application.

  2. Identify and reverse hash values used in URL parameters.

  3. Test for unauthorized access by manipulating object references.

  4. Retrieve the hidden flag by exploiting the IDOR flaw.


Skills Demonstrated

  • Web application analysis

  • IDOR identification and exploitation

  • Hash cracking with online tools (CrackStation)

  • Custom hash generation using CyberChef

  • URL manipulation techniques


Relevance

IDOR vulnerabilities are among the most common and impactful issues in modern web applications. This challenge effectively demonstrates how weak access control combined with predictable or reversible identifiers can allow attackers to access restricted resources. Understanding how to identify and exploit IDOR is essential for penetration testers and security professionals working with APIs and web-based platforms.

Last updated