Back to Course

Cyber Rangers

0% Complete
0/0 Steps
  1. course overview

    Syllabus | Cyber Rangers
  2. Zoom Links
    1 Topic
  3. Module 1: Welcome to the Cyber Squad
    Morphing into a Cyber Ranger
    3 Topics
  4. What’s in the Digital World?
    3 Topics
  5. Cyber Threats: Meet the Villains
    3 Topics
  6. The Cyber Defense Arsenal
    3 Topics
  7. The Art of the Hack
    3 Topics
  8. CTF: The First Mission
    2 Topics
  9. Red Ranger – Network Defender (Sessions 7-10)
    The Power of Firewalls
    3 Topics
  10. DDoS Attacks: When Too Much is Too Bad
    3 Topics
  11. Wi-Fi Security: Is Your Home Network Safe?
    3 Topics
  12. CTF Challenge – Network Defense
  13. Blue Ranger – Cryptography Expert (Sessions 11-14)
    2048 Game - Understanding Code Logic
    3 Topics
  14. The Secret Language of Codes
  15. Modern Encryption: How Does It Work?
  16. Breaking the Code: Ethical Decryption
  17. CTF Challenge – Cryptography
  18. Yellow Ranger – Ethical Hacker (Sessions 15-18)
    Hacking for Good: The Role of Ethical Hackers
  19. Social Engineering: Trick or Treat?
  20. Web App Hacking: Finding Weak Spots
  21. CTF Challenge – Ethical Hacking
  22. Green Ranger – Threat Hunter (Sessions 19-20)
    Becoming a Threat Hunter
  23. CTF Challenge – Threat Hunting
  24. Module 3: Cyber Crisis Simulations
    Incident Response: Save the City’s Power Grid!
  25. Data Breach Mystery: Find the Insider
  26. Ransomware Attack: Pay or Fight?
  27. Module 4: The Cyber Rangers Final Battle
    Mega CTF Tournament
  28. Final Mission: Defend Cyber City
  29. Cyber Ranger Graduation
  30. Where to Next? Exploring Cybersecurity Careers
  31. Optional Content & Enrichment (10 Extra Sessions)
    Geographical Mapping
  32. Red Team vs. Blue Team
  33. Advanced Forensics
  34. OSINT Challenges
  35. Spy Games
  36. Lockpicking 101 (Virtual)
  37. Defusing a Virtual Bomb
  38. AI in Cybersecurity
  39. Create Your Own CTF Challenge
  40. Internet of Things (IoT) Hacking
  41. Cyber Rangers Hall of Fame
Lesson 7, Topic 3
In Progress

Lab Worksheet – The art of the hack

Cyber School 07/09/2025
Lesson Progress
0% Complete

Lab Worksheet: “Find the Weak Link” – Web Source Code Investigation
Objective: Simulate a real hacker’s reconnaissance and discovery phase using browser developer tools to find simple web vulnerabilities in a public challenge site.


⚙️ Requirements


🔍 Instructions

Step 1 – Open the Challenge

  1. Navigate to the chosen challenge URL.
  2. Read the challenge description carefully — understand what the site is asking you to do.
  3. Without using any tools yet, try interacting with the page normally (e.g., submitting a form or clicking buttons) to see how it behaves.

Step 2 – Open Developer Tools

  1. Open the browser’s Developer Tools by pressing F12 or right-clicking and choosing “Inspect.”
  2. Use the Elements tab to view the structure of the page (HTML).
  3. Use the Console or Sources tab to explore any JavaScript.

Step 3 – Analyze the Page

Look for the following clues in the page source:

  • Comments in HTML that contain hints or credentials.
  • JavaScript code that verifies input on the client side.
  • Hardcoded variables, passwords, or access flags.
  • Hidden form fields or values not visible on the main page.

Step 4 – Try to Manipulate Inputs

  1. Edit input fields directly in the Developer Tools (e.g., change a hidden field or default username).
  2. Resubmit the form with modified data to bypass basic checks.
  3. Try injecting unexpected input (e.g., special characters) into form fields to see how the site reacts.

Step 5 – Trigger the “Win” Condition

  1. Observe what happens when the site responds with a success message or a flag.
  2. Note whether the site reveals anything sensitive or gives access to the next stage.

Step 6 – Understand the Vulnerability

Once the flaw is discovered, mentally answer:

  • What type of weakness allowed the page to be bypassed?
    • Was it exposed information?
    • A logic flaw?
    • Lack of validation?
  • How could a real developer fix this issue (e.g., server-side validation, remove client-side secrets, sanitize inputs)?

Step 7 – Ethics Reminder

  • This exercise is done with permission, on safe environments designed for practice.
  • In real life, hacking without permission is illegal.
  • Cyber Rangers always hack ethically: to learn, to defend, and to improve the world.

✅ Summary

This lab simulates the reconnaissance and early exploitation phases of a real cyberattack — but in a safe, legal, educational setting.
You used built-in browser tools to inspect source code, analyze site behavior, and identify logic flaws or security weaknesses — just like ethical hackers do in real-world security testing.