Login
Register
Introduction 00 (next)
Course
Videos
Scoring
Introduction Badge
Introduction Badge (next)
Badges
Login
Register
Blue Badge
1390
Completed
24
Videos
11
Exercises
Patch Review Exercises
Exercises
Easy
PENTESTERLAB
S2-052
This exercise covers the exploitation of the Struts S2-052 vulnerability
1 video
Completed by 2339 students
Takes < 1 Hr. on average
Java/Struts
Easy
PENTESTERLAB
JWT VII
This exercise covers the exploitation of a website using JWT for session without verifying the signature
2 videos
Completed by 3025 students
Takes < 1 Hr. on average
jwt
cwe-310
Easy
PENTESTERLAB
Git Information Leak
This exercise details how to retrieve information from an exposed .git directory on a web server
1 video
Completed by 3108 students
Takes < 1 Hr. on average
Medium
PENTESTERLAB
JWT V
This exercise covers the exploitation of a trivial secret used to sign JWT tokens.
4 videos
Completed by 2760 students
Takes < 1 Hr. on average
jwt
cwe-310
Medium
PENTESTERLAB
Git Information Leak II
This exercise details how to retrieve information from an exposed .git directory on a web server. This time, the directly listing is disabled
1 video
Completed by 2357 students
Takes < 1 Hr. on average
Medium
PENTESTERLAB
JWT III
This exercise covers the exploitation of an issue in the usage of JWT token
3 videos
Completed by 2639 students
Takes 1-2 Hrs. on average
jwt
cwe-310
Medium
PENTESTERLAB
JWT IV
This exercise covers the exploitation of a vulnerability similar to the recent CVE-2017-17405 impacting Ruby Net::FTP
3 videos
Completed by 2452 students
Takes < 1 Hr. on average
jwt
cwe-310
Medium
PENTESTERLAB
JWT VI
This exercise covers the exploitation of an injection in the kid element of a JWT. This injection can be used to bypass the signature mechanism
3 videos
Completed by 2310 students
Takes < 1 Hr. on average
jwt
cwe-310
Medium
PENTESTERLAB
CBC-MAC II
This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV
1 video
Completed by 1577 students
Takes 1-2 Hrs. on average
crypto
Hard
PENTESTERLAB
CBC-MAC
This exercise covers the exploitation of signature of non-fixed size messages with CBC-MAC
2 videos
Completed by 1544 students
Takes 1-2 Hrs. on average
crypto
Hard
PENTESTERLAB
CVE-2018-0114
This exercise details the exploitation of a vulnerability in Cisco's node-jose, a JavaScript library created to manage JWT
3 videos
Completed by 1682 students
Takes 2-4 Hrs. on average
jwt
CWE-347