Course
In this exercise, we explore a CGI handling issue inspired by the HTTPoxy vulnerability. Using techniques from previous JWT and CVE-2016-5386 exercises, participants will learn to exploit this vulnerability to bypass authentication.
Skills covered
Injection
Authentication
Cryptography
Operating System
Network
Included with PRO
Full course content
2 videos
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.