Lab Icon

Hack the Login

Very Easy 22 Dec 2025 Free Access Solution Available

Start the machine, hack the system, and find the hidden flags to complete this challenge and earn points!

1
Flags
5
Points
51%
Success Rate
Start Your Challenge

Launch your dedicated machine to begin hacking

~1-2 min setup
Dedicated server
Private instance
Industry standard
Learn

Find the Code

First: Open the Target URL shown above in a new browser tab.

Every webpage loads resources. Press F12 to open DevTools and look at the HTML source.

Near the bottom of the HTML, find the <script> tag. It loads a JavaScript file - that's your answer.

JavaScript files often contain authentication logic. Finding them is your first step in web security analysis.
Read the Learn section above ⬆ and answer the question below ⬇
Step 1
Learn

Read the Authentication Logic

On the Target URL: Press F12, go to Sources tab, click on the .js file.

Look through the JavaScript code for an if statement that checks credentials.

You'll find something like: if (username === "..." - the value in quotes is the expected username.

Hardcoded credentials in client-side code is a critical vulnerability. Anyone can read JavaScript.
Read the Learn section above ⬆ and answer the question below ⬇
Step 2
Learn

Extract the Password

Same file: Look at the same if statement you found in the previous step.

The authentication check compares both username AND password. You already found the username.

Look for: && password === "..." - the value after the === is the password.

You now have both credentials. Next step: use them to log in and capture the flag.
Read the Learn section above ⬆ and answer the question below ⬇
Step 3
Learn

Capture the Flag

You have the credentials. Time to use them.

  1. Go to the Target URL login form
  2. Enter the username you found in the JavaScript
  3. Enter the password you found in the JavaScript
  4. Click Login
  5. Copy the flag and submit it below
You just completed a client-side authentication bypass - a real vulnerability found in production systems.
Read the Learn section above ⬆ and answer the question below ⬇
flag.txt
+5 pts