Brown Badge

8 Completed
23 Videos
26 Exercises
Easy image for Signing Oracle

Signing Oracle

  • This exercise covers how a signing oracle can be used to bypass authorization in place
  • 2 videos
  • Completed by 588 students
  • Takes Less than an hour on average
Easy image for JS Prototype Pollution

JS Prototype Pollution

  • This exercise covers how to exploit Prototype Pollution against a JavaScript application
  • 1 video
  • Completed by 623 students
  • Takes Less than an hour on average
Easy image for CVE-2021-41773

CVE-2021-41773

  • This challenge covers how to read arbitrary files by leveraging CVE-2021-41773
  • 1 video
  • Completed by 282 students
  • Takes Less than an hour on average
  • Apache
Easy image for JSON Web Encryption

JSON Web Encryption

  • This exercise covers how you can create your own JWE if you have access to the public key used by the se rver
  • 2 videos
  • Completed by 374 students
  • Takes Less than an hour on average
Easy image for Apache Pluto RCE

Apache Pluto RCE

  • This exercise covers how you can gain code execution in Apache Pluto 3.0.0 due to an issue in the authorisation logic
  • 1 video
  • Completed by 381 students
  • Takes Less than an hour on average
Easy image for Unicode and Uppercase

Unicode and Uppercase

  • This exercise covers how you can use unicode to gain access to an admin account.
  • 1 video
  • Completed by 469 students
  • Takes Less than an hour on average
Easy image for Unicode and Downcase

Unicode and Downcase

  • This exercise covers how you can use unicode to gain access to an admin account.
  • 1 video
  • Completed by 413 students
  • Takes Less than an hour on average
Easy image for Zip symlink

Zip symlink

  • This exercise covers how you can create a malicious Zip file and use it to gain access to sensitive files.
  • 1 video
  • Completed by 395 students
  • Takes Less than an hour on average
Easy image for CVE-2020-14343: PyYAML unsafe loader

CVE-2020-14343: PyYAML unsafe loader

  • This exercise covers how you can gain code execution when an application use a vulnerable version of PyYAML and relies on load()
  • Completed by 178 students
  • Takes Less than an hour on average
Easy image for Express Local File Read

Express Local File Read

  • This exercise covers how an insecure to render can be used to gain local file read with Express
  • 1 video
  • Completed by 189 students
  • Takes Less than an hour on average
Easy image for CVE-2021-40438

CVE-2021-40438

  • This challenge covers how to trigger a Server-Side Request Forgery by leveraging CVE-2021-40438
  • 1 video
  • Completed by 161 students
  • Takes Less than an hour on average
  • Apache
Easy image for GCM Nonce Reuse

GCM Nonce Reuse

  • This challenge covers the impact of nonce reuse on GCM
  • 2 videos
  • Completed by 37 students
  • Takes Between 1 and 2 hours on average
  • Ruby
Medium image for PHP phar://

PHP phar://

  • This exercise covers how the PHP phar:// handler can be used to gain code execution using PHP unserialize.
  • 1 video
  • Completed by 250 students
  • Takes Less than an hour on average
Medium image for Spring Actuators

Spring Actuators

  • This exercise covers how you can gain code execution using Spring Actuators when Spring Cloud is used.
  • 1 video
  • Completed by 201 students
  • Takes Between 1 and 2 hours on average
Medium image for From SQL injection to Shell III: PostgreSQL Edition

From SQL injection to Shell III: PostgreSQL Edition

  • This exercise covers how to gain access to an administration interface using SQL injection followed by how to get command execution using Ghostscript
  • Completed by 117 students
  • Takes Between 2 and 4 hours on average
  • Ruby-on-Rails
  • SQL Injection
Medium image for Unicode and NFKC

Unicode and NFKC

  • This exercise covers how can leverage unicode to get exploit a directory traversal
  • 1 video
  • Completed by 174 students
  • Takes Less than an hour on average
Medium image for EDDSA vulnerability in Monocypher

EDDSA vulnerability in Monocypher

  • This exercise covers the exploitation of a vulnerability impacting Monocypher.
  • 1 video
  • Completed by 70 students
  • Takes Between 1 and 2 hours on average
  • crypto
Medium image for CGI and Signature

CGI and Signature

  • This exercise covers the exploitation of a vulnerable CGI.
  • 1 video
  • Completed by 111 students
  • Takes Less than an hour on average
Medium image for CVE-2020-7115: Aruba Clearpass RCE

CVE-2020-7115: Aruba Clearpass RCE

  • This exercise covers a remote command execution issue on Aruba Clearpass RCE
  • 1 video
  • Completed by 118 students
  • Takes Between 1 and 2 hours on average
Medium image for CVE-2021-41773 II

CVE-2021-41773 II

  • This challenge covers how to gain code execution by leveraging CVE-2021-41773
  • 1 video
  • Completed by 78 students
  • Takes Between 2 and 4 hours on average
  • Apache
Medium image for CVE-2022-21449

CVE-2022-21449

  • This exercise covers the exploitation of CVE-2022-21449 against a Java Application relying on JWT
  • Completed by 34 students
  • Takes Between 1 and 2 hours on average
  • Java
Hard image for CVE-2020-8163: Rails local name RCE

CVE-2020-8163: Rails local name RCE

  • This exercise details the exploitation of CVE-2020-8163 to gain code execution
  • 2 videos
  • Completed by 142 students
  • Takes Between 2 and 4 hours on average
Hard image for RCE via argument injection

RCE via argument injection

  • This exercise covers a remote command execution vulnerability in which an attacker can only inject arguments
  • Completed by 24 students
  • Takes Between 2 and 4 hours on average
Hard image for Ox Remote Code Execution

Ox Remote Code Execution

  • This exercise covers how you can gain code execution when an application using Ox to deserialize data and run on Ruby 2.3
  • Completed by 20 students
  • Takes Between 2 and 4 hours on average
  • Ruby
Hard image for JSON Web Token XIII

JSON Web Token XIII

  • This exercise covers the exploitation of algorithm confusion when no public key is available
  • Completed by 79 students
  • Takes Between 1 and 2 hours on average
  • PHP
  • jwt
Hard image for Ox Remote Code Execution II

Ox Remote Code Execution II

  • This exercise covers how you can gain code execution when an application using Ox to deserialize data and run on Ruby 2.7
  • Completed by 11 students
  • Takes Between 2 and 4 hours on average
  • Ruby