Green Badge
421 Completed
31 Videos
16 Exercises
PentesterLab's Green badge teaches the exploitation of various vulnerabilities in web applications, including Ruby-on-Rails CVEs, SQL injections, GraphQL introspection, JWT, and Git self-hosted tools, to gain code execution and unauthorized access.
Exercises
Easy
PENTESTERLAB
GraphQL Introspection
- This exercise covers how to use introspection to get access to additional information in GraphQL.
- 1 video
- Completed by 2182 students
- Takes < 1 Hr. on average
- GraphQL/Node/Angular
Medium
PENTESTERLAB
Ruby 2.x Universal RCE Deserialization Gadget Chain
- This exercise covers how to get code execution by using a Ruby Universal Gadget when an attacker controls the data passed to Marshal.load()
- 1 video
- Completed by 1328 students
- Takes < 1 Hr. on average
- Ruby/Sinatra
Medium
PENTESTERLAB
GraphQL: SQL Injection
- This exercise covers how to use introspection and a SQL injection to get access to additional information in GraphQL.
- 1 video
- Completed by 1348 students
- Takes 1-2 Hrs. on average
- GraphQL/Node/Angular/SQLite3
Medium
PENTESTERLAB
CVE-2019-5420
- This exercise details the exploitation of CVE-2019-5420 to forge a session as another user
- 2 videos
- Completed by 835 students
- Takes 2-4 Hrs. on average
- Ruby-on-Rails
- CWE-330
Hard
PENTESTERLAB
From SQL injection to Shell III
- This exercise covers how to gain access to an administration interface using SQL injection followed by how to get command execution using ImageTragick
- 1 video
- Completed by 1064 students
- Takes 1-2 Hrs. on average
- Ruby-on-Rails
- SQL Injection
- CWE-89
Hard
PENTESTERLAB
Length Extension Attack
- This exercise covers how to use a length extension attack to exploit a directory traversal vulnerability
- 1 video
- Completed by 704 students
- Takes 1-2 Hrs. on average
- Ruby
Hard
PENTESTERLAB
Gogs RCE
- This exercise covers how to get code execution against the Git self hosted tool: Gogs.
- 3 videos
- Completed by 632 students
- Takes 1-2 Hrs. on average
- Golang
- CWE-384
Hard
PENTESTERLAB
Gogs RCE II
- This exercise covers how to get code execution against the Git self hosted tool: Gogs.
- 2 videos
- Completed by 567 students
- Takes < 1 Hr. on average
- Golang
- CWE-94
Hard
PENTESTERLAB
cve-2019-5420 II
- This exercise details the exploitation of CVE-2019-5420 to gain code execution
- 2 videos
- Completed by 531 students
- Takes 1-2 Hrs. on average
Hard
PENTESTERLAB
CVE-2019-5418
- This exercise details the exploitation of CVE-2019-5418 to get code execution
- 3 videos
- Completed by 472 students
- Takes 1-2 Hrs. on average
- CWE-22
Hard
PENTESTERLAB
IDOR to Shell
- This exercise covers how to get code execution by chaining vulnerabilities in a Ruby-on-Rails application
- 2 videos
- Completed by 994 students
- Takes 1-2 Hrs. on average
- Ruby-on-Rails
- CWE-639