Avatar

Labs / Button Activator

  • Daily Challenge
  • Released 15 Sep 2025

🔘 Can you activate what was meant to stay disabled?

This web application has a mysterious button that holds the key to success, but there's just one problem - it's completely deactivated! 🚫 The developers thought they were clever by disabling it, but client-side restrictions are rarely as secure as they appear. 💡 Put your browser manipulation skills to the test and discover how to breathe life back into this dormant button! 🔓

1
Flags
1
Points
Daily Challenge
Free Access
Start Lab Environment

Launch your dedicated AWS machine to begin hacking

~1-2 min setup
AWS dedicated
Private instance
Industry standard
Daily Challenge

🔘 Client-Side Security: JavaScript Manipulation

Modern web applications heavily rely on client-side JavaScript for user interface interactions and form validation. However, client-side controls can be easily bypassed by attackers who understand how to manipulate browser behavior. This challenge explores the fundamental security principle that client-side validation should never be the only line of defense.

🎯 What You'll Learn
  • ✓ Browser Developer Tools manipulation
  • ✓ JavaScript DOM element modification
  • ✓ Client-side security bypass techniques
  • ✓ HTML attribute manipulation
🔍 Challenge Overview

You're presented with a web application containing a button that appears to be disabled. The button promises to reveal a flag when clicked, but it seems unresponsive. Your task is to understand why the button is deactivated and find a way to enable it to retrieve the hidden flag.

Real-World Context: Many web applications use client-side JavaScript to disable form elements or buttons based on certain conditions. Understanding how to manipulate these controls is essential for security testing and demonstrates why server-side validation is crucial.

First Blood 🩸
iamwei