The white badge is our first and easiest badge. It covers a wide range of web vulnerabilities to give people a view of what kind of issues can be found in web application. We usually recommend to start with this badge.

  • 1 video
  • CGI/Apache/Bash
  • Completed by 1869 students

CVE-2014-6271/Shellshock

  • Difficulty:

This exercise covers the exploitation of a Bash vulnerability through a CGI.

  • 2 videos
  • PHP/Apache/Mysql
  • Completed by 1898 students

JSON Web Token

  • Difficulty:

This exercise covers the exploitation of a signature weakness in a JWT library.

  • 1 video
  • PHP/Apache/Mysql
  • Completed by 1658 students

From SQL Injection to Shell

  • Difficulty:

This exercise explains how you can, from a SQL injection, gain access to the administration console, then in the administration console, how you can run commands on the system.

  • 2 videos
  • Tomcat/Apache
  • Completed by 1201 students

CVE-2007-1860: mod_jk double-decoding

  • Difficulty:

This exercise covers the exploitation of CVE-2007-1860. This vulnerability allows an attacker to gain access to unaccessible pages using crafted requests. This is a common trick that a lot of testers miss.

  • 1 video
  • Python
  • Completed by 1202 students

Pickle Code Execution

  • Difficulty:

This exercise covers the exploitation of Python's pickle when used to deserialize untrusted data

  • 2 videos
  • PHP/Apache
  • Completed by 1118 students

Electronic Code Book

  • Difficulty:

This exercise explains how you can tamper with an encrypted cookies to access another user's account.