The Bunny’s Browser Trail Overview Room URL: https://tryhackme.com/room/adventofcyberpreptrack Difficulty: Easy Category: Prep Date Completed: 12/1/2025 Objectives Find the unusual User Agent in the HTTP log. Table of Contents Introduction Walk Through Lessons Learned Resources Introduction SOCMAS web servers are experiencing unusual traffic spikes, with one suspicious log entry revealing an unfamiliar User Agent: "BunnyOS/1.0 (HopSecBot)". Analyzing User Agent strings is critical for defenders to identify automated attacks and unauthorized visitors within network logs. Define User Agent A client application used by an end user, typically for a network protocol such as HTTP or FTP. Walk Through Click view site to open the http web log entries Several different user agents accessed this site Chrome on Windows Safari on MacOS Firefox on Linux Edge on Windows BunnyOS (HopSecBot) Safari on IoS Based on this the abnormal agent is BunnyOS and they accessed /admin/panel according to the log. Lessons Learned Learned to analyze HTTP web logs and identify User Agent strings to detect suspicious or automated traffic patterns Successfully identified BunnyOS (HopSecBot) as an anomalous User Agent among legitimate browsers, and discovered it accessed the sensitive /admin/panel endpoint, demonstrating how User Agent analysis reveals unauthorized system intrusions Resources TryHackMe Different User Agents