Web developers sometimes leave behind valuable secrets in places they think nobody will look. While most users only see the polished surface of a website, curious minds know that the real treasures often lie just beneath. This beginner-friendly challenge will teach you a fundamental skill every security professional needs: the art of looking beyond the obvious. 🕵️ Ready to discover what's been there all along?
Launch your dedicated machine to begin hacking
Broken Access Control is the #1 vulnerability in OWASP Top 10 (2021). It occurs when users can access resources without proper authentication or authorization.
Accessing files by changing URLs without checks
Protected resources accessible without login
Relying on hidden URLs instead of access controls
Regular users accessing admin functions
/x7k2m9p4/ provide zero security. Once paths are discovered, nothing prevents access.Information Disclosure occurs when web applications unintentionally expose sensitive data in places users shouldn't be able to access it.
TODO notes, file paths, credentials left in comments
API endpoints, authentication logic, internal URLs
Database details, file paths, system configuration
Testing credentials or development information
Information Disclosure typically leads to:
Web pages are built with HTML code. While browsers show you the rendered visual page, the underlying source code often contains additional information not visible to users.
When you visit a website, your browser downloads all the HTML, CSS, and JavaScript files. Developers often accidentally leave sensitive information in this code:
Ctrl+U (Windows/Linux)
Cmd+Option+U (macOS)
Right-click → "View Page Source"
Add view-source: before the URL
Choose how you want to get started
Choose a username to get started
We've sent a 9-character code to your email