If you have a valid cookie you can manipulate to switch login
1) Take the get request from Burp (try bdmin)
2) highlight cookie & Send to intruder
3) Attempt the Bit flip (hopefully it will flip bdmin to admin)
4) payloads ->payload type Bitflipper
options-> literal value
Oracle Padding Attack
Noted by Invalid Padding Errors
Example below assumes you can obtain a random valid cookie (registering a random account)
1) PadBuster.pl
padbuster.pl URL EncryptedSample(randomcookiefromdummyaccount) BlockSize(choose 8 or 16) -cookies auth=(randomcookiefromdummyaccount) -plaintext user=admin
2) should return cookie for an admin user that can be used in burp or cookie manager addon