Introduction
In this video walk-through, we covered conducting security review for a web application using browser developer tools.
In this room you will learn how to manually review a web application for security issues using only the in-built tools in your browser. More often than not, automated security tools and scripts will miss many potential vulnerabilities and useful information.
Here is a short breakdown of the in-built browser tools you will use throughout this room:
- View Source – Use your browser to view the human-readable source code of a website.
- Inspector – Learn how to inspect page elements and make changes to view usually blocked content.
- Debugger – Inspect and control the flow of a page’s JavaScript
- Network – See all the network requests a page makes.
Exploring the Website
The web application in question is Acme RTSupport, and the walkthrough emphasizes looking for interactive components like forms, buttons, and paywalls (sections of the page hidden for non-premium users).
The tester first reviews the page source by right-clicking and selecting “View Page Source”, looking for comments or hidden information in the HTML code.Comments in the page source reveal useful information, such as an alternative homepage (new-home.html
) and a framework version used to build the site.
Finding Hidden Flags
By visiting the new homepage (new-home.html
), the tester discovers a flag.Another flag is found by following a hidden link (/secret
), which is mentioned in the page source.The tester also finds a flag by accessing a directory listing (/assets/
) that reveals a file named flag.txt
.
Using the Inspector Tool
The Inspector tool allows the tester to examine the HTML structure and modify the page dynamically.The video demonstrates how to bypass the paywall by changing the CSS property for the element from display: block;
to display: none;
, which reveals hidden content, including a flag.
Using the Debugger Tool
The Debugger tool is used to pause the execution of the page at specific points using breakpoints.In the walkthrough, the tester sets a breakpoint at a line controlling a red flash that briefly appears on the page. By pausing the page execution at the right moment, the tester reveals a hidden flag within the flash.
Using the Network Tool
The Network tab is used to monitor and analyze all requests made between the browser and the server.The tester uses this tool to observe requests sent from the contact form and how the data is transmitted, which could reveal sensitive information or flags during real-world testing.
TryHackMe Walking an Application | Room Answers
What is the flag from the secret link?
What is the directory listing flag?
What is the framework flag?
It’s amazing for mе to have a weƄ рage, which is helpful for my knowledge.
thаnks admin