In web application security, hidden parameters are used by developers for testing or internal features. These parameters are not visible in the user interface but can still affect how the application works. If found and used properly, hidden parameters can help a penetration tester discover important issues like unauthorized access, admin panels and many more
What is Hidden Parameters?
Hidden parameters are parts of a web request that are not showing in the frontend . Developers are use to control features like:
- Admin access
- Debugging tools
- Beta features
- Internal testing
- Legacy functions
These parameters are usually passed through the URL, form data, cookies, or headers.
Why Should You Look for Hidden Parameters?
Finding hidden parameters can help you:
- Access the hidden features
- Discover and bypass the admin page
- Find internal APIs
- Test for IDOR or privilege escalation
- Find sensitive functions make by developers
How to Find Hidden Parameters
Use a Web Proxy Tool (like Burp Suite):
- Intercept and inspect requests
- Look for parameters in GET, POST, cookies, headers
- Change parameter values and see the response
Example:
https://example.com/profile?user=1001&debug=true
Use Arjun (Tool):
Arjun is the best hidden parameters finding tool .
Command:
- python3 arjun.py -u https://target.com/page
Check JavaScript Files:
Look inside .js files for parameters or hidden URLs.
Search for keywords like token, admin, mode, debug, etc.
Try Common Parameters Manually:
- Add these to the URL and see if anything changes:
- ?debug=true
- ?admin=1
- ?test=on
- ?access=full
Use Burp Extensions:
Param Miner: Finds hidden parameters automatically.
Autorize: Helps detect privilege issues.
Turbo Intruder: Fast brute-force the hidden parameter.
Real-World Example:
A page at:
Normally shows a user dashboard.
After testing with Param Miner:
This gave access to the admin dashboard. This was a security issue (access control flaw).