<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Medari Bharath Kumar on Medium]]></title>
        <description><![CDATA[Stories by Medari Bharath Kumar on Medium]]></description>
        <link>https://medium.com/@medaribharathkumar?source=rss-05846fcdd927------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/0*KuoKOvn5szyrw0TA</url>
            <title>Stories by Medari Bharath Kumar on Medium</title>
            <link>https://medium.com/@medaribharathkumar?source=rss-05846fcdd927------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 17 May 2026 17:36:35 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@medaribharathkumar/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Walking An Application-Tryhackme walkthrough]]></title>
            <link>https://medium.com/@medaribharathkumar/walking-an-application-tryhackme-walkthrough-c690a2e4949c?source=rss-05846fcdd927------2</link>
            <guid isPermaLink="false">https://medium.com/p/c690a2e4949c</guid>
            <dc:creator><![CDATA[Medari Bharath Kumar]]></dc:creator>
            <pubDate>Wed, 13 May 2026 17:47:23 GMT</pubDate>
            <atom:updated>2026-05-13T17:47:23.031Z</atom:updated>
            <content:encoded><![CDATA[<h3>Task1:walking an application</h3><p>This room teaches how to manually test a web application for security vulnerabilities using only the built-in tools available in a web browser. Manual testing is important because automated tools and scripts can miss hidden vulnerabilities and valuable information.</p><p>The room covers four main browser tools:</p><ul><li><strong>View Source</strong> — Allows you to see the website’s human-readable HTML source code.</li><li><strong>Inspector</strong> — Helps inspect and modify webpage elements to access hidden or restricted content.</li><li><strong>Debugger</strong> — Used to analyze and control the execution of JavaScript on a webpage.</li><li><strong>Network</strong> — Displays all network requests made by the website, helping identify data transfers and backend interactions.</li></ul><h3>Task2 -exploiting the website</h3><p>As a penetration tester, the main goal when reviewing a website or web application is to identify interactive features that could contain security vulnerabilities and test whether they can be exploited. These interactive areas may include login forms, signup pages, file uploads, password reset functions, dashboards, and other user-input sections.</p><p>A good starting point for web application testing is manually exploring the website using a browser and documenting each discovered page, feature, and its functionality. Reviewing JavaScript files and application behavior can also help uncover hidden or sensitive functionality.</p><p>The example review of the Acme IT Support website demonstrates how testers document application components, including:</p><ul><li>Home page and news sections</li><li>News articles with URL parameters (id=1)</li><li>Contact forms</li><li>Customer login, signup, and password reset pages</li><li>User dashboard and account management</li><li>Ticket creation forms with file upload functionality</li><li>Logout functionality</li></ul><p>This structured mapping of website features helps penetration testers understand the application’s attack surface and prepares them for deeper security analysis in later stages.</p><h3>Task3-viewing the page source</h3><p>Page Source refers to the human-readable code returned by a web server to the browser whenever a webpage is loaded. This code mainly consists of:</p><ul><li><strong>HTML</strong> — Defines the structure and content of the webpage.</li><li><strong>CSS</strong> — Controls the styling and appearance of the webpage.</li><li><strong>JavaScript</strong> — Adds interactivity and dynamic behavior.</li></ul><p>Viewing the page source is an important skill in web application security testing because it can reveal hidden information that is not directly visible on the webpage.</p><p>Ways to view page source include:</p><ul><li>Right-clicking a webpage and selecting <strong>View Page Source</strong></li><li>Adding view-source: before a URL</li><li>Using browser developer tools or menu options</li></ul><p>The lesson highlights several important findings that can be discovered through source code analysis:</p><ul><li><strong>Developer Comments:</strong><br> HTML comments (&lt;!-- --&gt;) may contain notes, reminders, hidden URLs, or sensitive information left by developers.</li><li><strong>Hidden Links:</strong><br> Anchor tags (&lt;a&gt;) and their href attributes can reveal pages or directories not visible in the website navigation.</li><li><strong>Directory Listing Misconfiguration:</strong><br> Sometimes web servers allow directory browsing, exposing files such as backups, configuration files, source code, or confidential documents.</li><li><strong>Framework Identification:</strong><br> Page source can reveal which web framework and version a website is using. Outdated frameworks may contain publicly known vulnerabilities that attackers can exploit.</li></ul><p>Overall, reviewing page source helps penetration testers gather valuable information about the website structure, hidden content, technologies in use, and potential security weaknesses.</p><ol><li>What is the flag from the HTML comment?</li></ol><p>according to the hint which is given to us we should go the link which is specified in the source code of the main page</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/531/1*t3OGZddyJbhjAb56GbthaQ.png" /></figure><p>main page:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*2vg5yfMunJADlqb1ZnkRAw.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Drr4EqF5Hh9U06lgUl-4ig.png" /></figure><p>in the above code first line is eye catching telling us to go to the /new-home-beta page</p><p>then we go to the <a href="http:///new-home-beta">http://mechine-ip/new-home-beta</a></p><p>we will get first flag</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/713/1*30jtpvT5HrKGdANekN-H_g.png" /></figure><p>THM{HTML_COMMENTS_ARE_DANGEROUS}</p><p>2. What is the flag from the secret link?</p><p>from the source code of the main page we can see</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/987/1*92648FwbJfNlUcu8VPeF-A.png" /></figure><p>after opening that link we will find the flag</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/738/1*f1o5qSPVElDHgfg6yBiR9w.png" /></figure><p>THM{NOT_A_SECRET_ANYMORE}</p><p>3. What is the directory listing flag?</p><p>for the third question we should Try to access the URL where all of the static files (CSS, JS and Images) are stored.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/364/1*YFNf0Jt3vB31uwgkLoiBOQ.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/955/1*4QuwcZTNxFGI1l9PH4GJPA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/781/1*2AcdAq2j1AsuomcRIu0bdA.png" /></figure><p>THM{INVALID_DIRECTORY_PERMISSIONS}</p><p>4. What is the framework flag?</p><p>the hint you’re looking for: https://LAB_WEB_URL.p.thmlabs.com/&lt;file.zip&gt; — Find the file on the framework changelog page</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*37NQYp7EgpQ8nPqF4BPAhg.png" /></figure><p>go to the page /tmp.zip</p><h3>task4 -Developer Tools -inspector</h3><p><strong>Developer Tools</strong></p><p>Every modern browser includes developer tools; this is a tool kit used to aid web developers in debugging web applications and gives you a peek under the hood of a website to see what is going on. As a pentester, we can leverage these tools to provide us with a much better understanding of the web application. We’re specifically focusing on three features of the developer tool kit, Inspector, Debugger and Network.</p><h3>Opening Developer Tools</h3><p>The way to access developer tools is different for every browser. If you’re not sure how to access it, click the “View Site” button on the top right of this task to get instructions to how to access the tools for your browser.</p><h3>Inspector</h3><p>The page source doesn’t always represent what’s shown on a webpage; this is because CSS, JavaScript and user interaction can change the content and style of the page, which means we need a way to view what’s been displayed in the browser window at this exact time. Element inspector assists us with this by providing us with a live representation of what is currently on the website.</p><p>As well as viewing this live view, we can also edit and interact with the page elements, which is helpful for web developers to debug issues.</p><p>On the Acme IT Support website, click into the news section, where you’ll see three news articles.</p><p>The first two articles are readable, but the third has been blocked with a floating notice above the content stating you have to be a premium customer to view the article. These floating boxes blocking the page contents are often referred to as paywalls as they put up a metaphorical wall in front of the content you wish to see until you pay.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/810/0*_nI-C9ZqaOEx6PVI.png" /></figure><p>Right-clicking on the premium notice ( paywall ), you should be able to select the Inspect option from the menu, which opens the developer tools either on the bottom or right-hand side depending on your browser or preferences. You’ll now see the elements/HTML that make up the website ( similar to the screenshots below ).</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/540/0*ZKKCVlIJMy1qw_U5.png" /></figure><p>Locate the DIV element with the class premium-customer-blocker and click on it. You&#39;ll see all the CSS styles in the styles box that apply to this element, such as margin-top: 60px and text-align: center. The style we&#39;re interested in is the display: block. If you click on the word block, you can type a value of your own choice. Try typing none, and this will make the box disappear, revealing the content underneath it and a flag. If the element didn&#39;t have a display field, you could click below the last style and add in your own. Have a play with the element inspector, and you&#39;ll see you can change any of the information on the website, including the content. Remember this is only edited on your browser window, and when you press refresh, everything will be back to normal.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*IfT-YPP3dvXgrfOKyf38QA.png" /></figure><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*M-42SZ6l182bUi_-d9SruQ.png" /></figure><p>5)Developer Tools-Debugger</p><p><strong>Developer Tools — Debugger</strong></p><p>This panel in the developer tools is intended for debugging JavaScript, and again is an excellent feature for web developers wanting to work out why something might not be working. But as penetration testers, it gives us the option of digging deep into the JavaScript code. In Firefox and Safari, this feature is called Debugger, but in Google Chrome, it’s called Sources.</p><p>On the Acme IT Support website, click on the contact page, each time the page is loaded, you might notice a rapid flash of red on the screen. We’re going to use the Debugger to work out what this red flash is and if it contains anything interesting. Debugging a red dot wouldn’t be something you’d do in the real world as a penetration tester, but it does allow us to use this feature and get used to the Debugger.</p><p>In both browsers, on the left-hand side, you see a list of all the resources the current webpage is using. If you click into the assets folder, you’ll see a file named flash.min.js. Clicking on this file displays the contents of the JavaScript file.</p><p>Many times when viewing javascript files, you’ll notice that everything is on one line, which is because it has been minimised, which means all formatting ( tabs, spacing and newlines ) have been removed to make the file smaller. This file is no exception to this, and it has also been obfusticated, which makes it purposely difficult to read, so it can’t be copied as easily by other developers.</p><p>We can return some of the formattings by using the “Pretty Print” option, which looks like two braces { } to make it a little more readable, although due to the obfustication, it’s still difficult to comprehend what is going on with the file. If you scroll to the bottom of the flash.min.js file, you’ll see the line: flash[&#39;remove&#39;]();</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*meJrhsFgKuR7lLU0.png" /></figure><p>This little bit of JavaScript is what is removing the red popup from the page. We can utilise another feature of debugger called <strong>breakpoints</strong>. These are points in the code that we can force the browser to stop processing the JavaScript and pause the current execution.</p><p>If you click the line number that contains the above code, you’ll notice it turns blue; you’ve now inserted a breakpoint on this line. Now try refreshing the page, and you’ll notice the red box stays on the page instead of disappearing, and it contains a flag.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*U7ZxRCZBDVqNLcrDbxCIww.png" /></figure><h3>task5 -Developer Tools -Network</h3><p><strong>Developer Tools — Network</strong></p><p>The network tab on the developer tools can be used to keep track of every external request a webpage makes. If you click on the Network tab and then refresh the page, you’ll see all the files the page is requesting.</p><p>Try doing this on the contact page; you can press the trash can icon to delete the list if it gets a bit overpopulated.</p><p>With the network tab open, try filling in the contact form and pressing the <strong>Send Message</strong> button. You’ll notice an event in the network tab, and this is the form being submitted in the background using a method called AJAX. AJAX is a method for sending and receiving network data in a web application background without interfering by changing the current web page.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/815/0*-evSCLrcXu46MlW9.png" /></figure><p>Examine the new entry on the network tab that the contact form created and view the page the data was sent to in order to reveal a flag.</p><p>What is the flag shown on the contact-msg network request?</p><p>This is the hint you’re looking for: When you find the contact-msg request, make sure you click on it to reveal the response of the request (there might be a response tab shown when you click it).</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*eH7049GsKVMIiKPMIM0Ntg.png" /></figure><p>THM{GOT_AJAX_FLAG}</p><h3>Conclusion</h3><p>The <em>Walking an Application</em> room from TryHackMe provides a practical introduction to manual web application security testing using only the tools available inside a web browser. Throughout the room, we explored how penetration testers analyze websites by inspecting page source code, interacting with webpage elements through Developer Tools, debugging JavaScript, and monitoring network requests.</p><p>The room demonstrated how small mistakes such as exposed HTML comments, hidden links, insecure directory permissions, and weak client-side protections can reveal sensitive information to attackers. It also showed the importance of understanding how modern web applications function internally, especially how browsers process HTML, CSS, JavaScript, and AJAX requests.</p><p>By manually exploring the Acme IT Support website, we learned how to map application functionality, identify potential attack surfaces, and uncover hidden content without relying on automated tools. This highlights an important principle in web security testing: manual analysis often reveals issues that automated scanners may overlook.</p><p>Overall, this room serves as an excellent foundation for beginners entering the field of web application penetration testing and helps build essential skills required for deeper security analysis in future labs and real-world assessments.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c690a2e4949c" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>