EXERCISE | AVERAGE TIME TO COMPLETE | DIFFICULTY | # OF USERS COMPLETED | TIER | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2023-X5821
This challenge covers the review of a CVE in a Go codebase and its patch
|
-- | 11 | |||||||||
CVE-2024-X3X06
This challenge covers the review of a CVE in a Go codebase and its patch
|
-- | 11 | |||||||||
CVE-2022-XX975
This challenge covers the review of a CVE in a Go codebase and its patch
|
-- | 9 | |||||||||
API JWT REVOCATION
jwt
This exercise covers how to bypass a weak JWT Revocation Mechanism.
|
< 1 Hr. | 20 | |||||||||
Puzzle 06
Leverage a weak implementation of lowercase to access arbitrary files
|
< 1 Hr. | 7 | |||||||||
Puzzle 07
Leverage a weak implementation of lowercase to access arbitrary files
|
2-4 Hr. | 6 | |||||||||
API 18
This exercise covers how to exploit an authorization issue in an API.
|
< 1 Hr. | 23 | |||||||||
API 19
This exercise covers how to exploit an authorization issue in an API.
|
< 1 Hr. | 24 | |||||||||
API 20
This exercise covers how to exploit an authorization issue in an API.
|
< 1 Hr. | 27 | |||||||||
API 16
This exercise covers how to exploit an authorization issue in an API.
|
< 1 Hr. | 35 | |||||||||
API 17
This exercise covers how to exploit an authorization issue in an API.
|
< 1 Hr. | 34 | |||||||||
GraphQL Authorization 01
This exercise covers a simple authorization issue in a GraphQL application.
|
< 1 Hr. | 41 | |||||||||
GraphQL Authorization 02
This exercise covers a simple authorization issue in a GraphQL application.
|
< 1 Hr. | 38 | |||||||||
Golang Code Review #01
This challenge covers the review of a snippet of code written in Golang.
|
< 1 Hr. | 35 | |||||||||
Golang Code Review #03
This challenge covers the review of a snippet of code written in Golang.
|
< 1 Hr. | 26 | |||||||||
Golang Code Review #02
This challenge covers the review of a snippet of code written in Golang.
|
-- | 30 | |||||||||
CVE-2022-2X8XX
This challenge covers the review of a CVE in a Golang codebase and its patch
|
< 1 Hr. | 39 | |||||||||
CVE-2022-X10X8
This challenge covers the review of a CVE in a Golang codebase and its patch
|
-- | 34 | |||||||||
CVE-2024-X90X6
This challenge covers the review of a CVE in a Golang codebase and its patch
|
-- | 32 | |||||||||
ORM LEAK: SQLite
This exercise covers how to exploit an ORM leak vulnerability
|
< 1 Hr. | 21 | |||||||||
CVE-2022-X87X
This challenge covers the review of a CVE in a Golang codebase and its patch
|
-- | 33 | |||||||||
CVE-2023-51XX2
This challenge covers the review of a CVE in a Golang codebase and its patch
|
-- | 37 | |||||||||
CVE-2024-2791X
This challenge covers the review of a CVE in a Golang codebase and its patch
|
-- | 34 | |||||||||
ORM LEAK 02
This exercise covers how to exploit an ORM leak vulnerability
|
< 1 Hr. | 31 | |||||||||
Puzzle 05
Authentication Bypass using an SQL injection without or 1=1
|
1-2 Hr. | 15 | |||||||||
CVE-2022-2X24X
This challenge covers the review of a CVE in a Java codebase and its patch
|
-- | 45 | |||||||||
CVE-2023-3X4X6
This challenge covers the review of a CVE in a Java codebase and its patch
|
-- | 42 | |||||||||
CVE-2022-4x3x5
This challenge covers the review of a CVE in a Java codebase and its patch
|
-- | 38 | |||||||||
Puzzle 03
Find and exploit a Golang vulnerability inspired by CVE-2022-31683
|
1-2 Hr. | 14 | |||||||||
Java Code Review 14
This challenge covers the review of a simple codebase in Java
|
-- | 29 | |||||||||
Java Code Review 15
This challenge covers the review of a simple codebase in Java
|
-- | 28 | |||||||||
Java Code Review 16
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 22 | |||||||||
ORM LEAK 01
This exercise covers how to exploit a simple ORM leak.
|
1-2 Hr. | 49 | |||||||||
Java Code Review 11
This challenge covers the review of a simple codebase in Java
|
-- | 30 | |||||||||
Java Code Review 12
This challenge covers the review of a simple codebase in Java
|
-- | 30 | |||||||||
Java Code Review 13
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 32 | |||||||||
Java Code Review 10
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 38 | |||||||||
CVE-2023-4X25X
This challenge covers the review of a CVE in a Java codebase and its patch
|
-- | 39 | |||||||||
Puzzle 04
Leverage SQL LIKE to gain access to sensitive information
|
2-4 Hr. | 7 | |||||||||
CVE-2023-5X38X
This challenge covers the review of a CVE in a Java codebase and its patch
|
-- | 58 | |||||||||
CVE-2024-2X31X
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 65 | |||||||||
CVE-2024-X875X
This challenge covers the review of a CVE in a Java codebase and its patch
|
-- | 71 | |||||||||
CVE-2022-0415
Exploit CVE-2022-0415 to gain code execution in Gogs
|
2-4 Hr. | 10 | |||||||||
Java Code Review 07
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 42 | |||||||||
Java Code Review 08
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 45 | |||||||||
Java Code Review 09
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 33 | |||||||||
Puzzle 01
Find the XSS by leveraging backreferences in a regular expression
|
< 1 Hr. | 21 | |||||||||
Puzzle 02
XSS
CSP
Leverage a PHP trick to bypass CSP
|
< 1 Hr. | 22 | |||||||||
API 13
This exercise covers a complex filter bypass in API.
|
< 1 Hr. | 247 | |||||||||
API 14
This exercise covers how to exploit a leaked encrypted password with an API.
|
< 1 Hr. | 262 | |||||||||
API 15
This exercise covers how to exploit a leaked encrypted password with an API.
|
1-2 Hr. | 215 | |||||||||
Java Code Review 04
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 55 | |||||||||
Java Code Review 05
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 57 | |||||||||
Java Code Review 06
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 57 | |||||||||
API 10
This exercise covers a common filter bypass in API.
|
< 1 Hr. | 318 | |||||||||
API 11
This exercise covers a common filter bypass in API.
|
< 1 Hr. | 300 | |||||||||
API 12
This exercise covers a common filter bypass in API.
|
< 1 Hr. | 272 | |||||||||
Java Code Review 01
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 89 | |||||||||
Java Code Review 02
This challenge covers the review of a simple codebase in Java
|
< 1 Hr. | 86 | |||||||||
Java Code Review 03
This challenge covers the review of a simple codebase in Java
|
-- | 70 | |||||||||
JSON Web Token XV: CVE-2022-39227
jwt
This exercise covers the exploitation of polyglot token against python_jwt (CVE-2022-39227)
|
< 1 Hr. | 21 | |||||||||
CVE-2023-X48X9
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 71 | |||||||||
CVE-2009-387X
This challenge covers the review of a CVE in a Java codebase and its patch
|
1-2 Hr. | 117 | |||||||||
CVE-2023-5143X
This challenge covers the review of a CVE in a Java codebase and its patch
|
1-2 Hr. | 125 | |||||||||
GHSA-95XX
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 58 | |||||||||
CVE-2022-4x13x
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 57 | |||||||||
CVE-2023-46XX2
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 56 | |||||||||
Java Serialize 06
This exercise is one of our challenges to help you learn Java Serialisation exploitation
|
2-4 Hr. | 16 | |||||||||
API 09
This exercise covers how one can inspect HTTP responses to identify information leaks.
|
< 1 Hr. | 407 | |||||||||
Java Serialize 04
This exercise is one of our challenges to help you learn Java Serialisation exploitation
|
1-2 Hr. | 49 | |||||||||
Java Serialize 05
This exercise is one of our challenges to help you learn Java Serialisation exploitation
|
2-4 Hr. | 27 | |||||||||
Cache Poisoning 01
This exercise details how to exploit an application vulnerable to cache poisoning
|
< 1 Hr. | 76 | |||||||||
Cache Deception 02
This exercise details how to exploit an application vulnerable to cache deception
|
< 1 Hr. | 75 | |||||||||
CVE-2023-XXX83
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 67 | |||||||||
CVE-2023-289X6
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 55 | |||||||||
CVE-2023-350XX
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 60 | |||||||||
CVE-2022-XX910
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 59 | |||||||||
CVE-2022-342XX
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 58 | |||||||||
Cache Deception 01
This exercise details how to exploit an application vulnerable to cache deception
|
< 1 Hr. | 95 | |||||||||
CVE-2022-X50X6
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 64 | |||||||||
CVE-2023-25X4X
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 49 | |||||||||
CVE-202X-2561X
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 71 | |||||||||
CVE-2022-x0x08
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 92 | |||||||||
CVE-2022-4504x
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 114 | |||||||||
CVE-2022-X51X3
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 107 | |||||||||
CVE-2007-546X
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 70 | |||||||||
CVE-2011-XX61
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 71 | |||||||||
CVE-2006-6X6X
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 73 | |||||||||
Java Serialize 02
This exercise is one of our challenges to help you learn Java Serialisation exploitation
|
< 1 Hr. | 99 | |||||||||
Java Serialize 03
This exercise is one of our challenges to help you learn Java Serialisation exploitation
|
< 1 Hr. | 81 | |||||||||
CVE-2014-7X09
This challenge covers the review of a CVE in a Java codebase and its patch
|
1-2 Hr. | 134 | |||||||||
CVE-2020-9X8X
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 168 | |||||||||
CVE-2018-XX34
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 117 | |||||||||
CVE-2012-5XX3
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 82 | |||||||||
CVE-2022-X41X9
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 66 | |||||||||
CVE-2009-26X3
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 85 | |||||||||
CVE-2022-357X1
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 77 | |||||||||
CVE-2023-30XX1
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 95 | |||||||||
CVE-2023-2X8X1
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 96 | |||||||||
SAML: PySAML2 SSRF
This exercise covers the exploitation of a SSRF in PySAML2
|
< 1 Hr. | 44 | |||||||||
CVE-2022-378xx
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 281 | |||||||||
CVE-2022-x0x09
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 128 | |||||||||
CVE-2018-8x14
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 65 | |||||||||
JSON Web Token XIV: Algorithm Confusion with ECDSA
jwt
This exercise covers the exploitation of algorithm confusion when no public key is available with a ECDSA key
|
1-2 Hr. | 21 | |||||||||
CVE-2014-X80X
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 97 | |||||||||
CVE-2015-3XX0
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 80 | |||||||||
CVE-2022-458X1
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 111 | |||||||||
SAML: CVE-2021-21239
This exercise covers the exploitation of CVE-2021-21239 (PySAML2)
|
1-2 Hr. | 35 | |||||||||
CVE-2022-393XX
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 89 | |||||||||
CVE-2023-2XX60
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 89 | |||||||||
CVE-2023-2XX61
This challenge covers the review of a CVE in a Java codebase and its patch
|
< 1 Hr. | 95 | |||||||||
SAML: Malicious IDP
This exercise covers the creation of a malicious IDP to forge an assertion
|
2-4 Hr. | 17 | |||||||||
DOMPDF RCE IV
This exercise covers the automation of the exploitation of a vulnerability in the DOMPDF library
|
> 4 Hr. | 19 | |||||||||
SAML: Signature Wrapping III
This exercise covers the exploitation of a Signature Wrapping Issue in passport-saml (CVE-2022-39299)
|
1-2 Hr. | 63 | |||||||||
XSL Java
This exercise covers the exploitation of a Java application using XSL
|
< 1 Hr. | 93 | |||||||||
DOMPDF RCE III
This exercise covers the exploitation of a vulnerability in the DOMPDF library
|
2-4 Hr. | 39 | |||||||||
XSL PHP V
This exercise covers the exploitation of a PHP application using XSL
|
< 1 Hr. | 94 | |||||||||
API Payments 07
This exercise covers a way to manipulate a shopping cart to lower the total amount
|
< 1 Hr. | 670 | |||||||||
CVE-2021-22204: Exiftool RCE II
This exercise covers how you can gain code execution when an application uses exiftool on user-controlled files
|
< 1 Hr. | 64 | |||||||||
XSL PHP IV
This exercise covers the exploitation of a PHP application using XSL
|
2-4 Hr. | 122 | |||||||||
API Payments 06
This exercise covers a simple payments bypass.
|
< 1 Hr. | 703 | |||||||||
CVE-2022-39224
This exercise covers the exploitation of CVE-2022-39224
|
2-4 Hr. | 71 | |||||||||
XSL PHP III
This exercise covers the exploitation of a PHP application using XSL
|
< 1 Hr. | 146 | |||||||||
DOMPDF RCE II
This exercise covers the exploitation of a vulnerability in the DOMPDF library
|
2-4 Hr. | 56 | |||||||||
DOMPDF RCE
This exercise covers the exploitation of a vulnerability in the DOMPDF library
|
< 1 Hr. | 123 | |||||||||
API Payments 05
This exercise covers how to abuse a shopping cart allowing users to apply a voucher.
|
< 1 Hr. | 634 | |||||||||
XSL PHP II
This exercise covers the exploitation of a PHP application using XSL
|
< 1 Hr. | 203 | |||||||||
API Payments 04
This exercise covers how to abuse a shopping cart allowing users to apply a voucher..
|
< 1 Hr. | 877 | |||||||||
XSL PHP
This exercise covers the exploitation of a PHP application using XSL
|
< 1 Hr. | 234 | |||||||||
API Payments 03
This exercise covers a simple payments bypass.
|
< 1 Hr. | 989 | |||||||||
Code Review 18
This exercise is one of our challenges to help you learn how to review real source code
|
1-2 Hr. | 130 | |||||||||
CVE-2020-13xxx
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 364 | |||||||||
CVE-2008-5x8x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 469 | |||||||||
CVE-2022-3x7x1
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 474 | |||||||||
Python Snippet #02
This challenge covers the review of a snippet of code written in Python
|
< 1 Hr. | 1380 | |||||||||
Java Snippet #10
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 1009 | |||||||||
Java Snippet #11
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 893 | |||||||||
Java Snippet #12
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 854 | |||||||||
API Payments 02
This exercise covers a simple payments bypass.
|
< 1 Hr. | 1144 | |||||||||
GCM Nonce Reuse
This challenge covers the impact of nonce reuse on GCM
|
< 1 Hr. | 135 | |||||||||
CVE-2019-5x2x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 324 | |||||||||
Java Snippet #07
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 1216 | |||||||||
Java Snippet #08
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 1257 | |||||||||
Java Snippet #09
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 883 | |||||||||
API Payments 01
API
This exercise covers a simple payments bypass.
|
< 1 Hr. | 1465 | |||||||||
CVE-2022-26xx9
This challenge covers a vulnerable snippet in a real Java application
|
< 1 Hr. | 335 | |||||||||
Python Snippet #07
This challenge covers the review of a snippet of code written in Python
|
< 1 Hr. | 1115 | |||||||||
Python Snippet #08
This challenge covers the review of a snippet of code written in Python
|
< 1 Hr. | 1091 | |||||||||
Python Snippet #09
This challenge covers the review of a snippet of code written in Python
|
< 1 Hr. | 1110 | |||||||||
Mongo IDOR
This challenge covers how to exploit an IDOR when Mongo IDs are used
|
< 1 Hr. | 837 | |||||||||
CVE-2008-5x8x_ii
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 336 | |||||||||
CVE-2005-2x8x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 349 | |||||||||
Golang Snippet #01
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 1207 | |||||||||
Java Snippet #06
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 881 | |||||||||
Python Snippet #06
This challenge covers the review of a snippet of code written in Python
|
< 1 Hr. | 1232 | |||||||||
CVE-2022-21449
jwt
This exercise covers the exploitation of CVE-2022-21449 against a Java Application relying on JWT
|
< 1 Hr. | 126 | |||||||||
CVE-2021-33564 Argument Injection in Ruby Dragonfly
This exercise covers how you can get arbitrary file read using CVE-2021-33564 against Refinery CMS
|
< 1 Hr. | 118 | |||||||||
CVE-2021-45xx9
This challenge covers a vulnerable snippet in a real Python application
|
< 1 Hr. | 476 | |||||||||
PHP Snippet #07
This challenge covers the review of a snippet of code written in PHP
|
< 1 Hr. | 1158 | |||||||||
PHP Snippet #08
This challenge covers the review of a snippet of code written in PHP
|
< 1 Hr. | 1011 | |||||||||
PHP Snippet #09
This challenge covers the review of a snippet of code written in PHP
|
< 1 Hr. | 1010 | |||||||||
Python Snippet #03
This challenge covers the review of a snippet of code written in Python
|
< 1 Hr. | 1227 | |||||||||
Python Snippet #04
This challenge covers the review of a snippet of code written in Python
|
< 1 Hr. | 1089 | |||||||||
Python Snippet #05
This challenge covers the review of a snippet of code written in Python
|
< 1 Hr. | 1138 | |||||||||
CVE-2021-39x3x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 344 | |||||||||
CVE-2022-21724: JDBC RCE PostgreSQL
This challenge covers how to gain code execution by leveraging a JDBC connection string with PostgreSQL
|
< 1 Hr. | 132 | |||||||||
Java Snippet #04
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 1058 | |||||||||
Java Snippet #05
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 962 | |||||||||
Ox Remote Code Execution II
This exercise covers how you can gain code execution when an application is using Ox to deserialize data and is running on Ruby 2.7
|
2-4 Hr. | 25 | |||||||||
CVE-2009-3x8x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 455 | |||||||||
HTTP 41
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2143 | |||||||||
HTTP 42
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2164 | |||||||||
HTTP 43
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2087 | |||||||||
CVE-2021-381xx
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 377 | |||||||||
H2 RCE
This challenge covers how to gain code execution by leveraging an H2 database in a Java application
|
< 1 Hr. | 97 | |||||||||
TypeScript Snippet #04
This challenge covers the review of a snippet of code written in TypeScript
|
< 1 Hr. | 758 | |||||||||
TypeScript Snippet #05
This challenge covers the review of a snippet of code written in TypeScript
|
< 1 Hr. | 785 | |||||||||
TypeScript Snippet #06
This challenge covers the review of a snippet of code written in TypeScript
|
< 1 Hr. | 676 | |||||||||
TypeScript Snippet #07
This challenge covers the review of a snippet of code written in TypeScript
|
< 1 Hr. | 630 | |||||||||
TypeScript Snippet #08
This challenge covers the review of a snippet of code written in TypeScript
|
< 1 Hr. | 684 | |||||||||
TypeScript Snippet #09
This challenge covers the review of a snippet of code written in TypeScript
|
< 1 Hr. | 717 | |||||||||
CVE-2008-4x9x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 404 | |||||||||
Log4j RCE II
This exercise is one of our challenges to help you learn Java Serialisation exploitation
|
1-2 Hr. | 150 | |||||||||
Log4j RCE
This challenge covers the latest RCE in Log4j
|
1-2 Hr. | 275 | |||||||||
CVE-2021-4379x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 468 | |||||||||
API 08
This exercise covers how one can inspect HTTP responses to identify information leaks.
|
< 1 Hr. | 1242 | |||||||||
JDBC RCE
This exercise is one of our challenges to help you learn Java Serialisation exploitation
|
2-4 Hr. | 51 | |||||||||
CVE-2008-1x3x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 590 | |||||||||
Golang Snippet #12
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 666 | |||||||||
TypeScript Snippet #01
This challenge covers the review of a snippet of code written in TypeScript
|
< 1 Hr. | 959 | |||||||||
TypeScript Snippet #02
This challenge covers the review of a snippet of code written in TypeScript
|
< 1 Hr. | 904 | |||||||||
TypeScript Snippet #03
This challenge covers the review of a snippet of code written in TypeScript
|
< 1 Hr. | 842 | |||||||||
API 07
API
Angular
This exercise covers how one can inspect JavaScript code to identify information leak.
|
< 1 Hr. | 1315 | |||||||||
CVE-2021-40438
This challenge covers how to trigger a Server-Side Request Forgery by leveraging CVE-2021-40438
|
< 1 Hr. | 292 | |||||||||
CVE-2021-41773
This challenge covers how to read arbitrary files by leveraging CVE-2021-41773
|
< 1 Hr. | 474 | |||||||||
CVE-2021-41773 II
This challenge covers how to gain code execution by leveraging CVE-2021-41773
|
1-2 Hr. | 166 | |||||||||
HTTP 36
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2339 | |||||||||
HTTP 37
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2317 | |||||||||
HTTP 38
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2356 | |||||||||
HTTP 39
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2343 | |||||||||
HTTP 40
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2355 | |||||||||
CVE-2006-4xxx
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 463 | |||||||||
CVE-2006-4xxx_ii
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 362 | |||||||||
PHP Snippet #04
This challenge covers the review of a snippet of code written in PHP
|
< 1 Hr. | 1291 | |||||||||
PHP Snippet #05
This challenge covers the review of a snippet of code written in PHP
|
< 1 Hr. | 1206 | |||||||||
PHP Snippet #06
This challenge covers the review of a snippet of code written in PHP
|
< 1 Hr. | 1282 | |||||||||
API 06
API
Angular
This exercise covers how one can inspect JavaScript code to identify unused endpoints.
|
< 1 Hr. | 1470 | |||||||||
CVE-2021-37xxx
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 421 | |||||||||
PHP Snippet #01
This challenge covers the review of a snippet of code written in PHP
|
< 1 Hr. | 1851 | |||||||||
PHP Snippet #02
This challenge covers the review of a snippet of code written in PHP
|
< 1 Hr. | 1584 | |||||||||
PHP Snippet #03
This challenge covers the review of a snippet of code written in PHP
|
< 1 Hr. | 1359 | |||||||||
HTTP 31
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2470 | |||||||||
HTTP 32
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2415 | |||||||||
HTTP 35
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2405 | |||||||||
HTTP 34
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2377 | |||||||||
HTTP 33
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2408 | |||||||||
API 05
API
Angular
This exercise covers how one can inspect JavaScript code to identify unused endpoints.
|
< 1 Hr. | 1747 | |||||||||
API 04
API
Angular
This exercise covers how one can inspect JavaScript code to identify unused endpoints.
|
< 1 Hr. | 1829 | |||||||||
Golang Snippet #02
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 968 | |||||||||
Golang Snippet #03
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 800 | |||||||||
Golang Snippet #04
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 880 | |||||||||
Golang Snippet #05
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 860 | |||||||||
Golang Snippet #06
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 755 | |||||||||
Golang Snippet #07
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 784 | |||||||||
Golang Snippet #08
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 723 | |||||||||
Golang Snippet #09
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 679 | |||||||||
Golang Snippet #10
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 770 | |||||||||
Golang Snippet #11
This challenge covers the review of a snippet of code written in Golang
|
< 1 Hr. | 759 | |||||||||
Javascript Snippet #01
This challenge covers the review of a snippet of code written in JavaScript
|
< 1 Hr. | 1573 | |||||||||
Javascript Snippet #02
This challenge covers the review of a snippet of code written in JavaScript
|
< 1 Hr. | 1267 | |||||||||
Javascript Snippet #03
This challenge covers the review of a snippet of code written in JavaScript
|
< 1 Hr. | 1288 | |||||||||
Javascript Snippet #04
This challenge covers the review of a snippet of code written in JavaScript
|
< 1 Hr. | 1190 | |||||||||
Javascript Snippet #05
This challenge covers the review of a snippet of code written in JavaScript
|
< 1 Hr. | 1247 | |||||||||
Javascript Snippet #06
This challenge covers the review of a snippet of code written in JavaScript
|
< 1 Hr. | 1136 | |||||||||
Javascript Snippet #07
This challenge covers the review of a snippet of code written in JavaScript
|
< 1 Hr. | 1113 | |||||||||
Python Snippet #01
This challenge covers the review of a snippet of code written in Python
|
< 1 Hr. | 1511 | |||||||||
Ruby Snippet #01
This challenge covers the review of a snippet of code written in Ruby
|
< 1 Hr. | 597 | |||||||||
Ruby Snippet #02
This challenge covers the review of a snippet of code written in Ruby
|
< 1 Hr. | 561 | |||||||||
Ruby Snippet #03
This challenge covers the review of a snippet of code written in Ruby
|
< 1 Hr. | 595 | |||||||||
Ruby Snippet #04
This challenge covers the review of a snippet of code written in Ruby
|
< 1 Hr. | 531 | |||||||||
Ruby Snippet #05
This challenge covers the review of a snippet of code written in Ruby
|
< 1 Hr. | 609 | |||||||||
Ruby Snippet #06
This challenge covers the review of a snippet of code written in Ruby
|
< 1 Hr. | 591 | |||||||||
Ruby Snippet #07
This challenge covers the review of a snippet of code written in Ruby
|
< 1 Hr. | 470 | |||||||||
Ruby Snippet #08
This challenge covers the review of a snippet of code written in Ruby
|
< 1 Hr. | 512 | |||||||||
Ruby Snippet #09
This challenge covers the review of a snippet of code written in Ruby
|
< 1 Hr. | 472 | |||||||||
HTTP 26
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2656 | |||||||||
HTTP 27
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2591 | |||||||||
HTTP 28
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2584 | |||||||||
HTTP 29
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2507 | |||||||||
HTTP 30
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2550 | |||||||||
CVE-2020-17xx7
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 781 | |||||||||
Ox Remote Code Execution
This exercise covers how you can gain code execution when an application is using Ox to deserialize data and is running on Ruby 2.3
|
2-4 Hr. | 65 | |||||||||
CVE-2020-9x9x
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 613 | |||||||||
HTTP 21
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2792 | |||||||||
HTTP 22
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2759 | |||||||||
HTTP 23
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2689 | |||||||||
HTTP 24
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2687 | |||||||||
HTTP 25
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2713 | |||||||||
HTTP 16
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2893 | |||||||||
HTTP 20
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2802 | |||||||||
HTTP 18
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2859 | |||||||||
HTTP 19
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2844 | |||||||||
HTTP 17
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2872 | |||||||||
CVE-2020-17xx8
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 448 | |||||||||
CVE-2021-22204: Exiftool RCE
This exercise covers how you can gain code execution when an application uses exiftool on user-controlled files
|
1-2 Hr. | 158 | |||||||||
SSRF via FFMPEG II
This exercise covers how you can read arbitrary files when an application uses ffmpeg to render videos from a video you provide
|
< 1 Hr. | 110 | |||||||||
API 03
API
This exercise is the API version of an exercise you already solved in another badge. You should use it to get more confident with discovering vulnerabilities without any hint on what to look for.
|
< 1 Hr. | 1881 | |||||||||
CVE-2020-11xxx
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 459 | |||||||||
OAuth2: Authorization Server XSS II
This exercise covers the exploitation of an XSS in an OAuth2 Authorization Server
|
< 1 Hr. | 239 | |||||||||
HTTP 11
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3122 | |||||||||
HTTP 15
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 2999 | |||||||||
HTTP 12
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3081 | |||||||||
HTTP 13
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3011 | |||||||||
HTTP 14
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3017 | |||||||||
API 02
API
This exercise is the API version of an exercise you already solved in another badge. You should use it to get more confident with discovering vulnerabilities without any hint on what to look for.
|
< 1 Hr. | 2431 | |||||||||
Express Local File Read
This exercise covers how an insecure call to render can be used to gain local files read with Express
|
< 1 Hr. | 352 | |||||||||
OAuth2: Authorization Server XSS
This exercise covers the exploitation of an XSS in an OAuth2 Authorization Server
|
< 1 Hr. | 316 | |||||||||
HTTP 10
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3199 | |||||||||
HTTP 09
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3285 | |||||||||
HTTP 07
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3374 | |||||||||
HTTP 06
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3448 | |||||||||
HTTP 08
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3292 | |||||||||
HTTP 03
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3750 | |||||||||
HTTP 04
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3617 | |||||||||
HTTP 05
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3551 | |||||||||
HTTP 02
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 3947 | |||||||||
HTTP 01
This challenge covers how to send specific HTTP requests
|
< 1 Hr. | 4173 | |||||||||
API 01
API
This exercise is the API version of an exercise you already solved in the Essential Badge. You should use it to get more confident with discovering vulnerabilities without any hint on what to look for.
|
< 1 Hr. | 2907 | |||||||||
JSON Web Token XIII
jwt
This exercise covers the exploitation of algorithm confusion when no public key is available
|
< 1 Hr. | 155 | |||||||||
SAML: Comment Injection II
This exercise covers the exploitation of a comment injection vulnerability in SAML
|
< 1 Hr. | 506 | |||||||||
Recon 24
In this challenge, you need to look for a file named key.txt in the place used to serve the assets for the main website
|
< 1 Hr. | 3929 | |||||||||
Recon 25
In this challenge, you need to look for a file named key2.txt in the place used to serve the assets for the main website
|
1-2 Hr. | 2412 | |||||||||
Recon 26
In this challenge, you need to look for a key in the JavaScript used by the website
|
< 1 Hr. | 3756 | |||||||||
SSRF via FFMPEG
This exercise covers how you can read arbitrary files when an application uses ffmpeg to render videos from a video you provide
|
< 1 Hr. | 221 | |||||||||
SAML: Signature Wrapping II
This exercise covers how to use Signature Wrapping to become an arbitrary user
|
< 1 Hr. | 379 | |||||||||
RCE via argument injection
This exercise covers a remote command execution vulnerability via argument injection
|
> 4 Hr. | 41 | |||||||||
Code Review 16
This exercise is one of our challenges to help you learn how to review real source code
|
< 1 Hr. | 244 | |||||||||
SAML: Signature Wrapping
This exercise covers how to use Signature Wrapping to become an arbitrary user
|
< 1 Hr. | 473 | |||||||||
Recon 20
In this challenge, you need to look at the branches in repo3
|
< 1 Hr. | 4017 | |||||||||
Recon 21
In this challenge, you need to look at the information in the branches for repo4
|
< 1 Hr. | 3922 | |||||||||
Recon 22
In this challenge, you need to look in repo9 for deleted files
|
< 1 Hr. | 3751 | |||||||||
Recon 23
In this challenge, you need to look for sensitive information in commit messages
|
< 1 Hr. | 3754 | |||||||||
SAML: SAMLResponse forwarding
This exercise covers how to pass the SAMLResponse from one Service Provider to another
|
< 1 Hr. | 430 | |||||||||
CGI and Signature
This exercise covers the exploitation of a vulnerable CGI.
|
< 1 Hr. | 193 | |||||||||
Recon 17
In this challenge, you need to look at the name of the developer used in the repository test1
|
< 1 Hr. | 4300 | |||||||||
Recon 18
In this challenge, you need to look at the public repository of the developers in the organisation
|
< 1 Hr. | 4058 | |||||||||
Recon 19
In this challenge, you need to look at the email addresses used for commits in the repository repo7
|
< 1 Hr. | 3791 | |||||||||
Code Review 15
This exercise is one of our challenges to help you learn how to review real source code
|
< 1 Hr. | 239 | |||||||||
Code Review 14
This exercise is one of our challenges to help you learn how to review real source code
|
< 1 Hr. | 259 | |||||||||
CVE-2020-14343: PyYAML unsafe loader
This exercise covers how you can gain code execution when an application use a vulnerable version of PyYAML and relies on load()
|
< 1 Hr. | 278 | |||||||||
OAuth2: State Fixation
This exercise covers the exploitation of a state fixation in an OAuth2 Client
|
1-2 Hr. | 355 | |||||||||
Code Review 13
This exercise is one of our challenges to help you learn how to review real source code
|
2-4 Hr. | 167 | |||||||||
CVE-2020-7115: Aruba Clearpass RCE
This exercise covers a remote command execution issue on Aruba Clearpass RCE
|
< 1 Hr. | 184 | |||||||||
Code Review 12
This exercise is one of our challenges to help you learn how to review real source code
|
< 1 Hr. | 288 | |||||||||
OAuth2: Predictable State II
This exercise covers the exploitation of a predictable state in an OAuth2 Client
|
1-2 Hr. | 241 | |||||||||
Recon 13
In this challenge, you need to find the TXT record linked to key.z.hackycorp.com
|
< 1 Hr. | 5059 | |||||||||
Recon 14
In this challenge, you need to find a TXT record by doing a zone transfer on z.hackycorp.com
|
< 1 Hr. | 4552 | |||||||||
Recon 15
In this challenge, you need to find a TXT record by doing a zone transfer on the internal zone "int"
|
< 1 Hr. | 4045 | |||||||||
Recon 16
In this challenge, you need to find the version of Bind used
|
< 1 Hr. | 4232 | |||||||||
EDDSA vulnerability in Monocypher
Crypto
This exercise covers the exploitation of a vulnerability impacting Monocypher.
|
1-2 Hr. | 149 | |||||||||
Code Review 11
This exercise is one of our challenges to help you learn how to review real source code
|
2-4 Hr. | 119 | |||||||||
OAuth2: Predictable State
This exercise covers the exploitation of a predictable state in an OAuth2 Client
|
2-4 Hr. | 261 | |||||||||
Code Review 10
This exercise is one of our challenges to help you learn how to review real source code
|
< 1 Hr. | 226 | |||||||||
Recon 11 | < 1 Hr. | 4556 | |||||||||
Recon 12 | < 1 Hr. | 5052 | |||||||||
Unicode and NFKC
This exercise covers how to leverage unicode to exploit a directory traversal
|
< 1 Hr. | 271 | |||||||||
SAML: Trusted Embedded Key
This exercise covers the exploitation of a Service Provider (SP) that doesn't check the certificate provided in the SAMLResponse
|
< 1 Hr. | 444 | |||||||||
Recon 06
This exercise covers default vhost
|
< 1 Hr. | 9024 | |||||||||
Recon 07
This exercise covers default TLS vhost
|
< 1 Hr. | 8124 | |||||||||
Recon 08
This exercise covers aliases in TLS certificates
|
< 1 Hr. | 7338 | |||||||||
CVE-2020-8163: Rails local name RCE
This exercise details the exploitation of CVE-2020-8163 to gain code execution
|
1-2 Hr. | 205 | |||||||||
SAML: Known Key
This exercise covers the exploitation of a known key in SAML
|
1-2 Hr. | 468 | |||||||||
Code Review 09
This exercise is one of our challenges to help you learn how to review real source code
|
1-2 Hr. | 167 | |||||||||
Recon 04
This exercise covers common interesting directories
|
< 1 Hr. | 12437 | |||||||||
Recon 05
This exercise covers simple directory bruteforcing
|
< 1 Hr. | 9213 | |||||||||
Recon 01
This exercise covers 404 error pages
|
< 1 Hr. | 16506 | |||||||||
OAuth2: Client Server XSS
This exercise covers the exploitation of a Cross-Site Scripting in an OAuth2 Client and Server
|
1-2 Hr. | 334 | |||||||||
Zip symlink
This exercise covers how you can create a malicious Zip file and use it to gain access to sensitive files.
|
< 1 Hr. | 535 | |||||||||
Code Review 08
This exercise is one of our challenges to help you learn how to review real source code
|
1-2 Hr. | 247 | |||||||||
SAML: Comment Injection
This exercise covers the exploitation of a comment injection vulnerability in SAML
|
< 1 Hr. | 1439 | |||||||||
Unicode and Downcase
This exercise covers how you can use unicode to gain access to an admin account.
|
< 1 Hr. | 553 | |||||||||
Code Review 07
This exercise is one of our challenges to help you learn how to review real source code
|
1-2 Hr. | 197 | |||||||||
Java Serialize 01
This exercise is one of our challenges to help you learn Java Serialisation exploitation
|
< 1 Hr. | 348 | |||||||||
Unicode and Uppercase
This exercise covers how you can use unicode to gain access to an admin account.
|
< 1 Hr. | 616 | |||||||||
Code Review 06
This exercise is one of our challenges to help you learn how to review real source code
|
2-4 Hr. | 132 | |||||||||
Cross-Site Leak
This exercise covers how to use Cross-Site Leak to recover sensitive information
|
2-4 Hr. | 529 | |||||||||
From SQL injection to Shell III: PostgreSQL Edition
SQL Injection
This exercise covers how to gain access to an administration interface using a SQL injection, and how to get command execution using Ghostscript
|
2-4 Hr. | 210 | |||||||||
OAuth2: Client CSRF II
This exercise covers the exploitation of a CSRF in an OAuth2 Client
|
2-4 Hr. | 453 | |||||||||
XSS Include
XSS
This exercise covers how to use Cross-Site-Scripting Include to leak information
|
< 1 Hr. | 1208 | |||||||||
OAuth2: Client CSRF
This exercise covers the exploitation of a CSRF in an OAuth2 Client
|
< 1 Hr. | 895 | |||||||||
Code Review 05
This exercise is one of our challenges to help you learn how to review real source code
|
2-4 Hr. | 164 | |||||||||
Code Review 04
This exercise is one of our challenges to help you learn how to review real source code
|
1-2 Hr. | 275 | |||||||||
JS Prototype Pollution
This exercise covers how to exploit Prototype Pollution against a JavaScript application
|
< 1 Hr. | 830 | |||||||||
OAuth2: Authorization Server CSRF
This exercise covers the exploitation of a CSRF in an OAuth2 Authorization Server
|
1-2 Hr. | 1033 | |||||||||
Code Review 03
This exercise is one of our challenges to help you learn how to review real source code
|
2-4 Hr. | 187 | |||||||||
SSRF in PDF generation
This exercise covers how you can read arbitrary files when an application generates pdfs from provided links
|
< 1 Hr. | 812 | |||||||||
OAuth2: Github HTTP HEAD
This exercise covers the exploitation of the HTTP HEAD issue impacting Github in 2019
|
< 1 Hr. | 424 | |||||||||
SVG XSS
This exercise covers how to use an SVG to trigger a Cross-Site-Scripting
|
< 1 Hr. | 1656 | |||||||||
Apache Pluto RCE
This exercise covers how to gain code execution on Apache Pluto 3.0.0 due to a flaw in the authorization logic
|
< 1 Hr. | 494 | |||||||||
JSON Cross-Site Request Forgery
This exercise details the exploitation of a Cross-Site Request Forgery when JSON is used
|
< 1 Hr. | 1366 | |||||||||
Cross-Site Request Forgery
This exercise details the exploitation of a Cross-Site Request Forgery to gain access to sensitive data
|
< 1 Hr. | 1444 | |||||||||
Code Review 02
This exercise is one of our challenges to help you learn how to review real source code
|
1-2 Hr. | 338 | |||||||||
postMessage() IV
This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information when a listener does not filter the Origin and X-Frame-Options is used
|
< 1 Hr. | 884 | |||||||||
Spring Actuators
This exercise covers how you can gain code execution using Spring Actuators when Spring Cloud is used.
|
1-2 Hr. | 262 | |||||||||
postMessage() III
This exercise covers how insecure calls to the JavaScript function postMessage() can be used to trigger a Cross-Site Scripting
|
1-2 Hr. | 896 | |||||||||
postMessage() II
This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information when a listener does not filter the Origin
|
< 1 Hr. | 995 | |||||||||
PHP phar://
This exercise covers how the PHP phar:// handler can be used to gain code execution using PHP unserialize.
|
< 1 Hr. | 322 | |||||||||
Signing Oracle
This exercise covers how a signing oracle can be used to bypass authorization in place
|
< 1 Hr. | 753 | |||||||||
Length Extension Attack
This exercise covers how to use a length extension attack to exploit a directory traversal vulnerability
|
1-2 Hr. | 678 | |||||||||
JSON Web Encryption
This exercise covers how you can create your own JWE if you have access to the public key used by the server
|
< 1 Hr. | 484 | |||||||||
postMessage()
This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information
|
< 1 Hr. | 1129 | |||||||||
CVE-2019-5418
This exercise details the exploitation of CVE-2019-5418 to get code execution
|
1-2 Hr. | 453 | |||||||||
Cross-Site WebSocket Hijacking
This exercise covers Cross-Site WebSocket Hijacking and how it can be used to gain access to sensitive information
|
< 1 Hr. | 1019 | |||||||||
JWT XII
jwt
This exercise covers how to use the x5u header to bypass an authentication based on JWT.
|
1-2 Hr. | 621 | |||||||||
Cross-Origin Resource Sharing II
This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.
|
< 1 Hr. | 963 | |||||||||
JWT XI
jwt
This exercise covers how to use the jku header to bypass an authentication based on JWT.
|
1-2 Hr. | 616 | |||||||||
cve-2019-5420 II
This exercise details the exploitation of CVE-2019-5420 to gain code execution
|
1-2 Hr. | 511 | |||||||||
OAuth2: Client OpenRedirect
This exercise covers the exploitation of an OpenRedirect in an OAuth2 Client
|
< 1 Hr. | 775 | |||||||||
CVE-2019-5420
This exercise details the exploitation of CVE-2019-5420 to forge a session as another user
|
2-4 Hr. | 808 | |||||||||
JWT X
jwt
This exercise covers how to use the jku header to bypass an authentication based on JWT.
|
< 1 Hr. | 700 | |||||||||
GraphQL: SQL Injection
This exercise covers how to use introspection and a SQL injection to get access to additional information in GraphQL.
|
1-2 Hr. | 1304 | |||||||||
OAuth2: Authorization Server OpenRedirect
This exercise covers the exploitation of an OpenRedirect in an OAuth2 Authorization Server
|
< 1 Hr. | 888 | |||||||||
JWT IX
jwt
This exercise covers how to use the jku header to bypass an authentication based on JWT.
|
< 1 Hr. | 815 | |||||||||
Gogs RCE II
This exercise covers how to get code execution against the Git self hosted tool: Gogs.
|
< 1 Hr. | 546 | |||||||||
JWT VIII
jwt
This exercise covers how to use the jku header to bypass an authentication based on JWT.
|
1-2 Hr. | 881 | |||||||||
SAML: Signature Stripping
This exercise covers the exploitation of a signature stripping vulnerability in SAML
|
< 1 Hr. | 1808 | |||||||||
GraphQL Introspection
This exercise covers how to use introspection to get access to additional information in GraphQL.
|
< 1 Hr. | 2123 | |||||||||
Gogs RCE
This exercise covers how to get code execution against the Git self hosted tool: Gogs.
|
1-2 Hr. | 611 | |||||||||
Android 07
This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data
|
1-2 Hr. | 1287 | |||||||||
Android 06
This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data
|
< 1 Hr. | 1510 | |||||||||
Android 05
This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data
|
1-2 Hr. | 1790 | |||||||||
Ruby 2.x Universal RCE Deserialization Gadget Chain
This exercise covers how to get code execution by using a Ruby Universal Gadget when an attacker controls the data passed to Marshal.load()
|
< 1 Hr. | 1296 | |||||||||
CVE-2018-10933: LibSSH auth bypass
This exercise covers how to bypass authentication on an SSH server based on libssh to gain a shell on the affected system
|
-- | 0 | |||||||||
Android 04
This exercise will guide you through the process of reversing a simple Android code
|
< 1 Hr. | 2286 | |||||||||
Android 03
This exercise will guide you through the process of extracting simple information from an APK
|
< 1 Hr. | 3065 | |||||||||
From SQL injection to Shell III
SQL Injection
This exercise covers how to gain access to an administration interface using SQL injection followed by how to get command execution using ImageTragick
|
1-2 Hr. | 1021 | |||||||||
Android 02
This exercise will guide you through the process of extracting data from a simple database used by an Android app
|
< 1 Hr. | 3337 | |||||||||
IDOR to Shell
This exercise covers how to get code execution by chaining vulnerabilities in a Ruby-on-Rails application
|
1-2 Hr. | 958 | |||||||||
Android 01
This exercise will guide you through the process of extracting simple information from an APK
|
< 1 Hr. | 3564 | |||||||||
Introduction to CSP
This exercise details the exploitation of a XSS in a simple web application that uses Content Security Policy
|
< 1 Hr. | 2309 | |||||||||
CVE-2018-11235: Git Submodule RCE
This exercise details the exploitation of a vulnerability in Git Sub
module that can be used to get command execution
|
2-4 Hr. | 476 | |||||||||
Git Information Leak II
This exercise details how to retrieve information from an exposed .git directory on a web server, provided directory listing is disabled
|
< 1 Hr. | 2422 | |||||||||
Git Information Leak
This exercise details how to retrieve information from an exposed .git directory on a web server
|
< 1 Hr. | 3271 | |||||||||
JWT VII
jwt
This exercise covers the exploitation of a website using JWT for session without verifying the signature
|
< 1 Hr. | 3112 | |||||||||
CVE-2016-5386: HTTPoxy/Golang HTTProxy namespace conflict
This exercise covers the exploitation of HTTPoxy against an old version of Golang
|
< 1 Hr. | 857 | |||||||||
Unix 31
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 13372 | |||||||||
Unix 30
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 13401 | |||||||||
Unix 25
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 14051 | |||||||||
Unix 32
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 13349 | |||||||||
Unix 34
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 13285 | |||||||||
Unix 33
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 13322 | |||||||||
Unix 27
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 13875 | |||||||||
Unix 29
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 13799 | |||||||||
Unix 28
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 13823 | |||||||||
Unix 26
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 13961 | |||||||||
CBC-MAC II
Crypto
This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV
|
1-2 Hr. | 1617 | |||||||||
JWT VI
jwt
This exercise covers the exploitation of an injection in the kid element of a JWT. This injection can be used to bypass the signature mechanism
|
< 1 Hr. | 2377 | |||||||||
CVE-2018-6574: go get RCE
This exercise covers a remote command execution in Golang's go get command.
|
< 1 Hr. | 822 | |||||||||
Unix 11
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 18808 | |||||||||
Unix 12
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 18299 | |||||||||
Unix 13
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 17475 | |||||||||
Unix 14
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 17048 | |||||||||
Unix 15
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 15543 | |||||||||
Unix 16
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 15186 | |||||||||
Unix 17
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 15414 | |||||||||
Unix 18
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 15343 | |||||||||
Unix 19
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 15252 | |||||||||
Unix 20
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 14311 | |||||||||
Unix 21
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 14495 | |||||||||
Unix 22
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 14360 | |||||||||
Unix 23
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 14135 | |||||||||
Unix 24
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 14054 | |||||||||
JWT V
jwt
This exercise covers the exploitation of a trivial secret used to sign JWT tokens.
|
< 1 Hr. | 2833 | |||||||||
CVE-2018-0114
jwt
This exercise details
the exploitation of a vulnerability in Cisco's node-jose, a JavaScript library created to manage JWT
|
2-4 Hr. | 1728 | |||||||||
JWT IV
jwt
This exercise covers the exploitation of a vulnerability similar to the recent CVE-2017-17405 impacting Ruby Net::FTP
|
< 1 Hr. | 2519 | |||||||||
CBC-MAC
Crypto
This exercise covers the exploitation of signature of non-fixed size messages with CBC-MAC
|
1-2 Hr. | 1580 | |||||||||
JWT III
jwt
This exercise covers the exploitation of an issue in the usage of JWT token
|
1-2 Hr. | 2712 | |||||||||
Code Execution 09
This exercise is one of our challenges on Code Execution
|
< 1 Hr. | 10221 | |||||||||
Server Side Template Injection 02
This exercise is one of our challenges on Server-Side Template Injection
|
< 1 Hr. | 8023 | |||||||||
MongoDB Injection 02
This exercise is one of our challenges on vulnerabilities related to MongoDB
|
1-2 Hr. | 8035 | |||||||||
Authorization 06
This exercise is one of our challenges on Authorisation issues
|
< 1 Hr. | 13986 | |||||||||
Code Execution 08
This exercise is one of our challenges on Code Execution
|
< 1 Hr. | 10316 | |||||||||
Authorization 04
This exercise is one of our challenges on Authorisation issues
|
< 1 Hr. | 15098 | |||||||||
Authorization 05
This exercise is one of our challenges on Authorisation issues
|
< 1 Hr. | 14566 | |||||||||
Command Execution 03
This exercise is one of our challenges on Command Execution
|
< 1 Hr. | 10661 | |||||||||
Server Side Template Injection 01
This exercise is one of our challenges on Server-Side Template Injection
|
< 1 Hr. | 8016 | |||||||||
Code Execution 05
This exercise is one of our challenges on Code Execution
|
< 1 Hr. | 11771 | |||||||||
Code Execution 06
This exercise is one of our challenges on Code Execution
|
< 1 Hr. | 11518 | |||||||||
Code Execution 07
This exercise is one of our challenges on Code Execution
|
< 1 Hr. | 11275 | |||||||||
Introduction to code review
This exercise covers the different ways to perform code review. It also contains a simple application to review to help you get started.
|
-- | 0 | |||||||||
S2-052
This exercise covers the exploitation of the Struts S2-052 vulnerability
|
< 1 Hr. | 2399 | |||||||||
SQL Injection 06
SQL Injection
This exercise is one of our challenges on SQL Injections
|
< 1 Hr. | 8804 | |||||||||
XML Attacks 01
This exercise is one of our challenges on vulnerabilities related to XML processing
|
< 1 Hr. | 8519 | |||||||||
XML Attacks 02
This exercise is one of our challenges on vulnerabilities related to XML processing
|
< 1 Hr. | 8059 | |||||||||
SQL Injection 04
SQL Injection
This exercise is one of our challenges on SQL Injections
|
< 1 Hr. | 9334 | |||||||||
SQL Injection 05
SQL Injection
This exercise is one of our challenges on SQL Injections
|
< 1 Hr. | 9249 | |||||||||
SQL Injection 01
SQL Injection
This exercise is one of our challenges on SQL Injections
|
< 1 Hr. | 10404 | |||||||||
SQL Injection 02
SQL Injection
This exercise is one of our challenges on SQL Injections
|
< 1 Hr. | 10060 | |||||||||
SQL Injection 03
SQL Injection
This exercise is one of our challenges on SQL Injections
|
< 1 Hr. | 9776 | |||||||||
Code Execution 02
This exercise is one of our challenges on Code Execution
|
< 1 Hr. | 13047 | |||||||||
Authorization 03
This exercise is one of our challenges on Authorisation issues
|
< 1 Hr. | 16066 | |||||||||
Command Execution 01
This exercise is one of our challenges on Command Execution
|
< 1 Hr. | 11124 | |||||||||
Command Execution 02
This exercise is one of our challenges on Command Execution
|
< 1 Hr. | 10783 | |||||||||
Server Side Request Forgery 04
This exercise is one of our challenges on Server-Side Request Forgery
|
< 1 Hr. | 9134 | |||||||||
Open Redirect 01
This exercise is one of our challenges on Open Redirect
|
< 1 Hr. | 9435 | |||||||||
Open Redirect 02
This exercise is one of our challenges on Open Redirect
|
< 1 Hr. | 9131 | |||||||||
MongoDB Injection 01
This exercise is one of our challenges on vulnerabilities related to MongoDB
|
< 1 Hr. | 9547 | |||||||||
SAML: Introduction
This exercise covers the exploitation of a signature stripping vulnerability in SAML
|
< 1 Hr. | 2504 | |||||||||
Server Side Request Forgery 02
This exercise is one of our challenges on Server-Side Request Forgery
|
< 1 Hr. | 9482 | |||||||||
Server Side Request Forgery 03
This exercise is one of our challenges on Server-Side Request Forgery
|
< 1 Hr. | 9447 | |||||||||
Server Side Request Forgery 01
This exercise is one of our challenges on Server-Side Request Forgery
|
< 1 Hr. | 9660 | |||||||||
XSS 09
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 8574 | |||||||||
XSS 10
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 7951 | |||||||||
Directory Traversal 01
This exercise is one of our challenges on Directory Traversal
|
< 1 Hr. | 11351 | |||||||||
Directory Traversal 02
This exercise is one of our challenges on Directory Traversal
|
< 1 Hr. | 11137 | |||||||||
Directory Traversal 03
This exercise is one of our challenges on Directory Traversal
|
< 1 Hr. | 10997 | |||||||||
XSS 02
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 10121 | |||||||||
XSS 03
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 9756 | |||||||||
XSS 04
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 9280 | |||||||||
XSS 05
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 8998 | |||||||||
XSS 06
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 8954 | |||||||||
XSS 07
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 8803 | |||||||||
XSS 08
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 8674 | |||||||||
File Upload 01
This exercise is one of our challenges on Upload vulnerabilities
|
< 1 Hr. | 8769 | |||||||||
File Upload 02
This exercise is one of our challenges on Upload vulnerabilities
|
< 1 Hr. | 8654 | |||||||||
XSS 01
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 10539 | |||||||||
Authentication 05
This exercise is one of our challenges on Authentication issues
|
< 1 Hr. | 16476 | |||||||||
Code Execution 03
This exercise is one of our challenges on Code Execution
|
< 1 Hr. | 12391 | |||||||||
Code Execution 04
This exercise is one of our challenges on Code Execution
|
< 1 Hr. | 12154 | |||||||||
File Include 01
This exercise is one of our challenges on File Include vulnerabilities
|
< 1 Hr. | 10486 | |||||||||
File Include 02
This exercise is one of our challenges on File Include vulnerabilities
|
< 1 Hr. | 10218 | |||||||||
LDAP 01
This exercise is one of our challenges on vulnerabilities related to LDAP
|
< 1 Hr. | 10160 | |||||||||
LDAP 02
This exercise is one of our challenges on vulnerabilities related to LDAP
|
< 1 Hr. | 9707 | |||||||||
Authentication 04
This exercise is one of our challenges on Authentication issues
|
< 1 Hr. | 17232 | |||||||||
Authentication 01
This exercise is one of our challenges on Authentication issues
|
< 1 Hr. | 18718 | |||||||||
Authentication 02
This exercise is one of our challenges on Authentication issues
|
< 1 Hr. | 18078 | |||||||||
Authentication 03
This exercise is one of our challenges on Authentication issues
|
< 1 Hr. | 17555 | |||||||||
Authorization 01
This exercise is one of our challenges on Authorisation issues
|
< 1 Hr. | 16619 | |||||||||
Authorization 02
This exercise is one of our challenges on Authorisation issues
|
< 1 Hr. | 16312 | |||||||||
Code Execution 01
This exercise is one of our challenges on Code Execution
|
< 1 Hr. | 13860 | |||||||||
CVE-2016-10033: PHPMailer RCE
This exercise covers a remote code execution vulnerability in PHPMailer
|
< 1 Hr. | 3557 | |||||||||
Cipher block chaining
Crypto
This exercise details how to tamper with data encrypted using CBC
|
1-2 Hr. | 2770 | |||||||||
Struts s2-045
This exercise covers a Remote Code Execution in Struts 2.
|
< 1 Hr. | 2634 | |||||||||
CVE-2016-2098
This exercise covers a remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data
|
< 1 Hr. | 3471 | |||||||||
CVE-2014-4511: Gitlist RCE
This exercise explains how you can exploit a vulnerability published in 2014 in Gitlist.
|
-- | 0 | |||||||||
ECDSA
Crypto
This exercise covers the exploitation of a weakness in the usage of ECDSA
|
2-4 Hr. | 332 | |||||||||
Werkzeug DEBUG
This challenge was written for Ruxcon CTF 2015 and cover the Debug mode of Werkzeug/Flask
|
< 1 Hr. | 1560 | |||||||||
Padding Oracle
This exercise covers an attack against CBC mode. This attack can be used to decrypt data and re-encrypt arbitrary data
|
1-2 Hr. | 811 | |||||||||
Unickle
This challenge was written for Ruxcon CTF 2015. It's an SQL injection mixed with a remote code execution.
|
1-2 Hr. | 648 | |||||||||
CVE-2015-3224
This exercise is a challenge written for Nullcon CTF in 2015
|
< 1 Hr. | 1567 | |||||||||
Luhn
This challenge was written for Ruxcon CTF 2015. It's an SQL injection with a twist
|
2-4 Hr. | 598 | |||||||||
CVE-2013-0156: Rails Object Injection
This exercise covers the exploitation of a code execution in Ruby-on-Rails using XML and YAML.
|
< 1 Hr. | 3836 | |||||||||
JSON Web Token II
jwt
This exercise covers the exploitation of an issue with some implementations of JWT
|
1-2 Hr. | 3547 | |||||||||
CVE-2016-0792
This exercise covers the exploitation of an Xstream vulnerability in Jenkins
|
< 1 Hr. | 4571 | |||||||||
ObjectInputStream
This exercise covers the exploitation of a call to readObject in a Spring application
|
< 1 Hr. | 4119 | |||||||||
XMLDecoder
This exercise covers the exploitation of an application using XMLDecoder
|
< 1 Hr. | 5117 | |||||||||
CVE-2014-1266
This exercise covers how to intercept an HTTPs connection
|
1-2 Hr. | 1044 | |||||||||
CVE-2011-0228
This exercise covers how to intercept an HTTPs connection
|
1-2 Hr. | 1197 | |||||||||
Intercept 03
This exercise covers how to intercept an HTTPs connection with hostname verification.
|
< 1 Hr. | 1471 | |||||||||
Intercept 02
This exercise covers how to intercept an HTTPs connection.
|
< 1 Hr. | 1623 | |||||||||
Intercept 01
This exercise covers how to intercept an HTTP connection.
|
1-2 Hr. | 1793 | |||||||||
Struts devMode
This exercise covers how to get code execution when a Struts application is running in devMode
|
-- | 0 | |||||||||
JSON Web Token
jwt
This exercise covers the exploitation of a signature weakness in a JWT library.
|
< 1 Hr. | 9568 | |||||||||
Cross-Origin Resource Sharing
This exercise covers Cross-Origin Resource Sharing and how it can be used to bypass CSRF protection if it's misconfigured
|
-- | 0 | |||||||||
API to Shell
API
This exercise covers the exploitation of PHP type confusion to bypass a signature and the exploitation of unserialize.
|
2-4 Hr. | 3317 | |||||||||
Pickle Code Execution
This exercise covers the exploitation of Python's pickle when used to deserialize untrusted data
|
< 1 Hr. | 6105 | |||||||||
Play XML Entities
This exercise covers the exploitation of XML entities in the Play framework
|
1-2 Hr. | 2147 | |||||||||
CVE-2014-6271/Shellshock
This exercise covers the exploitation of a Bash vulnerability through a CGI.
|
< 1 Hr. | 8546 | |||||||||
Play Session Injection
This exercise covers the exploitation of a session injection in the Play framework. This issue can be used to tamper with the content of the session while bypassing the signing mechanism
|
< 1 Hr. | 2750 | |||||||||
CVE-2007-1860: mod_jk double-decoding
This exercise covers the exploitation of CVE-2007-1860. This vulnerability allows an attacker to gain access to inaccessible pages using crafted requests. This is a common trick that a lot of testers miss.
|
1-2 Hr. | 5820 | |||||||||
XSS and MySQL FILE
XSS
This exercise explains how to exploit a Cross-Site Scripting vulnerability to obtain an administrator's cookies, and how you can use their session to gain access to the administration panel, and find a SQL injection to gain code execution
|
-- | 0 | |||||||||
Electronic Code Book
Crypto
This exercise explains how you can tamper with encrypted cookies to access another user's account
|
1-2 Hr. | 5580 | |||||||||
Web for Pentester II
This exercise is a set of the most common web vulnerabilities.
|
-- | 0 | |||||||||
From SQL Injection to Shell II
SQL Injection
This exercise explains how you can, from a blind SQL injection, gain access to the administration console. Then once in the administration console, how you can run commands on the system.
|
2-4 Hr. | 1 | |||||||||
CVE-2012-6081: MoinMoin code execution
This exercise explains how you can exploit CVE-2012-6081 to gain code execution. This vulnerability was exploited to compromise Debian's wiki and Python documentation website
|
-- | 0 | |||||||||
Web for Pentester
This exercise is a set of the most common web vulnerabilities.
|
-- | 0 | |||||||||
Axis2 Web service and Tomcat Manager
This exercise explains the interactions between Tomcat and Apache, then it shows how to call and attack an Axis2 Web service. Using information retrieved from this attack, you will be able to gain access to the Tomcat Manager and deploy a WebShell to gain command execution.
|
-- | 0 | |||||||||
CVE-2008-1930: Wordpress 2.5 Cookie Integrity Protection Vulnerability
This exercise explains how you can exploit CVE-2008-1930 to gain access to the administration interface of a Wordpress installation.
|
< 1 Hr. | 10 | |||||||||
From SQL Injection to Shell: PostgreSQL edition
SQL Injection
This exercise explains how you can from a SQL injection gain access to the administration console, and from there, how you can run commands on the underlying system
|
-- | 0 | |||||||||
Rack Cookies and Commands injection
After a short brute force introduction, this exercise explains the tampering of rack cookies and how you can even manage to modify a signed cookie (if the secret is trivial). Using this issue, you will be able to escalate your privileges and gain command execution
|
-- | 0 | |||||||||
Linux Host Review
This exercise explains how to perform a Linux host review, what and how you can check the configuration of a Linux server to ensure it is securely configured. The reviewed system is a traditional Linux-Apache-Mysql-PHP (LAMP) server used to host a blog.
|
-- | 0 | |||||||||
CVE-2012-2661: ActiveRecord SQL injection
This exercise explains how you can exploit CVE-2012-2661 to retrieve information from a database
|
-- | 0 | |||||||||
CVE-2012-1823: PHP CGI
This exercise explains how you can exploit CVE-2012-1823 to retrieve the source code of an application and gain code execution.
|
-- | 0 | |||||||||
PHP Include And Post Exploitation
This exercise describes the exploitation of a local file include with limited access. Once code execution is gained, you will see some post exploitation tricks.
|
-- | 0 | |||||||||
From SQL Injection to Shell
SQL Injection
This exercise demonstrates how to leverage a SQL injection to gain access to the admin console, and from there, how to execute commands on the underlying system
|
< 1 Hr. | 7817 | |||||||||
Introduction 01
This exercise will guide through the process of scoring an exercise to mark it as completed
|
< 1 Hr. | 28377 | |||||||||
Introduction 02
This exercise will guide through the process of scoring an exercise to mark it as completed. Finding the key is just a little bit harder than the previous exercise.
|
< 1 Hr. | 28019 | |||||||||
Introduction 03
This exercise will guide through the process of scoring an exercise to mark it as completed. However, this time, you will run commands on the underlying operating system. You will need to run the score command with your UUID.
|
< 1 Hr. | 27374 | |||||||||
Introduction 00
This exercise will guide you through the process of scoring on an exercise to get it marked as completed
|
< 1 Hr. | 29357 | |||||||||
Unix 00
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 24569 | |||||||||
Unix 01
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 23976 | |||||||||
Unix 02
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 23696 | |||||||||
Unix 03
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 23380 | |||||||||
Unix 04
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 23053 | |||||||||
Unix 05
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 21930 | |||||||||
Unix 06
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 21033 | |||||||||
Unix 07
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 20672 | |||||||||
Unix 08
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 20335 | |||||||||
Unix 09
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 19700 | |||||||||
Unix 10
This exercise is one of our challenges to help you learn more about Unix/Linux
|
< 1 Hr. | 19179 | |||||||||
PCAP 01
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 7309 | |||||||||
PCAP 02
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 7131 | |||||||||
PCAP 03
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 7040 | |||||||||
PCAP 04
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6785 | |||||||||
PCAP 05
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6665 | |||||||||
PCAP 06
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6563 | |||||||||
PCAP 07
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6502 | |||||||||
PCAP 08
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6444 | |||||||||
PCAP 09
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6411 | |||||||||
PCAP 10
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6089 | |||||||||
PCAP 11
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6083 | |||||||||
PCAP 12
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6066 | |||||||||
PCAP 13
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6111 | |||||||||
PCAP 14
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6087 | |||||||||
PCAP 15
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6070 | |||||||||
PCAP 16
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 6047 | |||||||||
PCAP 17
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5993 | |||||||||
PCAP 18
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5987 | |||||||||
PCAP 19
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5964 | |||||||||
PCAP 20
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5841 | |||||||||
PCAP 21
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5784 | |||||||||
PCAP 22
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5775 | |||||||||
PCAP 23
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5762 | |||||||||
PCAP 24
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5750 | |||||||||
PCAP 25
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5751 | |||||||||
PCAP 26
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5745 | |||||||||
PCAP 27
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5691 | |||||||||
PCAP 28
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5665 | |||||||||
PCAP 29
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5648 | |||||||||
PCAP 30
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5621 | |||||||||
PCAP 31
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5600 | |||||||||
PCAP 32
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5523 | |||||||||
PCAP 33
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5419 | |||||||||
PCAP 34
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5486 | |||||||||
PCAP 35
This exercise is one of our challenges to help you learn how to analyze PCAP files
|
< 1 Hr. | 5562 | |||||||||
Android 08
This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data
|
1-2 Hr. | 1218 | |||||||||
Code Review 01
This exercise is one of our challenges to help you learn how to review real source code
|
1-2 Hr. | 553 | |||||||||
Recon 00
This exercise covers the robots.txt file
|
< 1 Hr. | 16520 | |||||||||
Recon 02
This exercise covers the security.txt file
|
< 1 Hr. | 13711 | |||||||||
Recon 03
This exercise covers directory listing
|
< 1 Hr. | 12199 | |||||||||
Recon 10
This exercise covers visual content discovery
|
< 1 Hr. | 5093 | |||||||||
Recon 09 | < 1 Hr. | 7907 | |||||||||
Code Review 17
This exercise is one of our challenges to help you learn how to review real source code
|
1-2 Hr. | 144 | |||||||||
Java Snippet #01
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 1265 | |||||||||
Java Snippet #02
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 1239 | |||||||||
Java Snippet #03
This challenge covers the review of a snippet of code written in Java
|
< 1 Hr. | 1084 | |||||||||
CVE-2021-4xx50
This challenge covers the review of a CVE and its patch
|
< 1 Hr. | 555 | |||||||||
No search results found... |