There are two ways to bypass front-end verification: First, debug using developer tools, and second, using Burpsuite to crawl directly. Here are some ideas to solve:
STAGE 1:for This exercise, your mission are to discover a coupon code to receive a unintended discount.
1. After entering the AJAX security->insecure Client Storage topic, open the developer tools positioning element
2, copy method, that is "Isvalidcoupon", into the sources JS file to find
3, at the IF (coupon = = decrypted) {Place a breakpoint; Enter any character in the captured input box to debug
4. Click the triangle symbol continuously and copy the value obtained from watch into the text file.
* * Use the Debug method to get the value, even transfer the corresponding value
5. Remove the breakpoint and type the obtained coupon into the input box and submit it. So Misson 1 is done.
STAGE 2:now, try to get your entire order for free.
1. Using BURP to intercept submitted requests
2, find the corresponding value, and change the payment amount to 0, click "Forward"
3, to this Misson 2 page completed
"Webgoat Exercise Analysis" AJAX security->insecure Client Storage