<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>PentesterLab</title>
    <description>PentesterLab Exercises!</description>
    <link>https://pentesterlab.com/exercises</link>
    <atom:link href="https://pentesterlab.com/exercises/feed" rel="self" type="application/rss+xml"/>
    <item>
      <title>CVE-2026-XX928</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx928</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx928</guid>
    </item>
    <item>
      <title>CVE-2026-XX762</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx762</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx762</guid>
    </item>
    <item>
      <title>CVE-2026-XX230</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx230</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx230</guid>
    </item>
    <item>
      <title>CVE-2026-XX977</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx977</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx977</guid>
    </item>
    <item>
      <title>CVE-2026-XX953</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx953</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx953</guid>
    </item>
    <item>
      <title>CVE-2023-51XX9</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-51xx9</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-51xx9</guid>
    </item>
    <item>
      <title>CVE-2026-XX130</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx130</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx130</guid>
    </item>
    <item>
      <title>CVE-2026-XX790</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx790</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx790</guid>
    </item>
    <item>
      <title>JWT: Refresh Token Bypass</title>
      <description>
        <![CDATA[This exercise covers bypassing JWT refresh token validation to maintain unauthorized access.]]>
      </description>
      <pubDate>Thu, 26 Mar 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-refresh-bypass</link>
      <guid>https://pentesterlab.com/exercises/jwt-refresh-bypass</guid>
    </item>
    <item>
      <title>CVE-2023-3X829</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Python codebase and its patch]]>
      </description>
      <pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-3x829</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-3x829</guid>
    </item>
    <item>
      <title>CVE-2026-2413X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-2413x</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-2413x</guid>
    </item>
    <item>
      <title>CVE-2026-21XX3</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Python codebase and its patch]]>
      </description>
      <pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-21xx3</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-21xx3</guid>
    </item>
    <item>
      <title>CVE-2024-X170X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a JavaScript codebase and its patch]]>
      </description>
      <pubDate>Fri, 13 Mar 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-x170x</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-x170x</guid>
    </item>
    <item>
      <title>CVE-2025-X9X28</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a typescript codebase and its patch]]>
      </description>
      <pubDate>Fri, 13 Mar 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-x9x28</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-x9x28</guid>
    </item>
    <item>
      <title>CVE-2025-X23XX</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a javascript codebase and its patch]]>
      </description>
      <pubDate>Fri, 13 Mar 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-x23xx</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-x23xx</guid>
    </item>
    <item>
      <title>CVE-2025-625X8</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a javascript codebase and its patch]]>
      </description>
      <pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-625x8</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-625x8</guid>
    </item>
    <item>
      <title>CVE-2026-X189X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-x189x</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-x189x</guid>
    </item>
    <item>
      <title>CVE-2026-XX871</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx871</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx871</guid>
    </item>
    <item>
      <title>CVE-2025-XX662</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-xx662</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-xx662</guid>
    </item>
    <item>
      <title>CVE-2025-XX953</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a typescript codebase and its patch]]>
      </description>
      <pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-xx953</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-xx953</guid>
    </item>
    <item>
      <title>CVE-2026-XX951</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a javascript codebase and its patch]]>
      </description>
      <pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx951</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx951</guid>
    </item>
    <item>
      <title>JWT: Signature Leak</title>
      <description>
        <![CDATA[This exercise covers exploiting a JWT signature leak to forge authentication tokens.]]>
      </description>
      <pubDate>Thu, 19 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-signature-leak</link>
      <guid>https://pentesterlab.com/exercises/jwt-signature-leak</guid>
    </item>
    <item>
      <title>CVE-2026-24895: FrankenPHP Path Confusion RCE using Unicode</title>
      <description>
      </description>
      <pubDate>Mon, 16 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-24895</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-24895</guid>
    </item>
    <item>
      <title>JWT: Invalid Algorithm</title>
      <description>
        <![CDATA[This exercise covers exploiting JWT algorithm validation flaws to bypass signature verification.]]>
      </description>
      <pubDate>Thu, 12 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-invalid-algorithm</link>
      <guid>https://pentesterlab.com/exercises/jwt-invalid-algorithm</guid>
    </item>
    <item>
      <title>CVE-2025-XX864</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a typescript codebase and its patch]]>
      </description>
      <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-xx864</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-xx864</guid>
    </item>
    <item>
      <title>CVE-2026-XX888</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a typescript codebase and its patch]]>
      </description>
      <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx888</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx888</guid>
    </item>
    <item>
      <title>CVE-2026-XX050</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a typescript codebase and its patch]]>
      </description>
      <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xx050</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xx050</guid>
    </item>
    <item>
      <title>CVE-2021-437XX</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a JavaScript codebase and its patch]]>
      </description>
      <pubDate>Sat, 31 Jan 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-437xx</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-437xx</guid>
    </item>
    <item>
      <title>CVE-2021-X27X0</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a JavaScript codebase and its patch]]>
      </description>
      <pubDate>Sat, 31 Jan 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-x27x0</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-x27x0</guid>
    </item>
    <item>
      <title>CVE-2020-XX079</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a javascript codebase and its patch]]>
      </description>
      <pubDate>Sat, 31 Jan 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2020-xx079</link>
      <guid>https://pentesterlab.com/exercises/cve-2020-xx079</guid>
    </item>
    <item>
      <title>CVE-2024-XX3X9</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 27 Jan 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-xx3x9</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-xx3x9</guid>
    </item>
    <item>
      <title>CVE-2026-XXX50</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 27 Jan 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2026-xxx50</link>
      <guid>https://pentesterlab.com/exercises/cve-2026-xxx50</guid>
    </item>
    <item>
      <title>CVE-2025-XXX57</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 27 Jan 2026 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-xxx57</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-xxx57</guid>
    </item>
    <item>
      <title>CVE-2025-0X6X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-0x6x</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-0x6x</guid>
    </item>
    <item>
      <title>CVE-2025-6X5X7</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-6x5x7</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-6x5x7</guid>
    </item>
    <item>
      <title>CVE-2024-X68X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 09 Dec 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-x68x</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-x68x</guid>
    </item>
    <item>
      <title>CVE-2023-2758X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a golang codebase and its patch]]>
      </description>
      <pubDate>Mon, 24 Nov 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-2758x</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-2758x</guid>
    </item>
    <item>
      <title>CVE-2017-1XX74</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a golang codebase and its patch]]>
      </description>
      <pubDate>Mon, 24 Nov 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2017-1xx74</link>
      <guid>https://pentesterlab.com/exercises/cve-2017-1xx74</guid>
    </item>
    <item>
      <title>CVE-202X-15X7</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a golang codebase and its patch]]>
      </description>
      <pubDate>Mon, 24 Nov 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-202x-15x7</link>
      <guid>https://pentesterlab.com/exercises/cve-202x-15x7</guid>
    </item>
    <item>
      <title>CVE-2025-627X0</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a java codebase and its patch]]>
      </description>
      <pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-627x0</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-627x0</guid>
    </item>
    <item>
      <title>CVE-2025-NOID</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a java codebase and its patch]]>
      </description>
      <pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-noid</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-noid</guid>
    </item>
    <item>
      <title>CVE-2022-2X457</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a java codebase and its patch]]>
      </description>
      <pubDate>Fri, 21 Nov 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-2x457</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-2x457</guid>
    </item>
    <item>
      <title>Latex: --shell-escape</title>
      <description>
        <![CDATA[This exercise covers how one can leverage latex when pdflatex is used with the --shell-escape option to gain command execution.]]>
      </description>
      <pubDate>Wed, 12 Nov 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/latex-shell-escape</link>
      <guid>https://pentesterlab.com/exercises/latex-shell-escape</guid>
    </item>
    <item>
      <title>Golang Code Review #07</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang.]]>
      </description>
      <pubDate>Fri, 31 Oct 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cr-golang-07</link>
      <guid>https://pentesterlab.com/exercises/cr-golang-07</guid>
    </item>
    <item>
      <title>CVE-2025-X93X0</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a golang codebase and its patch]]>
      </description>
      <pubDate>Fri, 31 Oct 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-x93x0</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-x93x0</guid>
    </item>
    <item>
      <title>CVE-2025-X215X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a golang codebase and its patch]]>
      </description>
      <pubDate>Fri, 31 Oct 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-x215x</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-x215x</guid>
    </item>
    <item>
      <title>CVE-2025-6X85</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 28 Oct 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-6x85</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-6x85</guid>
    </item>
    <item>
      <title>CVE-2025-X942X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 28 Oct 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-x942x</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-x942x</guid>
    </item>
    <item>
      <title>CVE-2025-6X9X2</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Tue, 28 Oct 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-6x9x2</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-6x9x2</guid>
    </item>
    <item>
      <title>CVE-2025-X270X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a python codebase and its patch]]>
      </description>
      <pubDate>Thu, 23 Oct 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-x270x</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-x270x</guid>
    </item>
    <item>
      <title>Puzzle 08</title>
      <description>
      </description>
      <pubDate>Sun, 28 Sep 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/puzzle-08</link>
      <guid>https://pentesterlab.com/exercises/puzzle-08</guid>
    </item>
    <item>
      <title>CVE-2021-X5X8</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang codebase and its patch]]>
      </description>
      <pubDate>Thu, 28 Aug 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-x5x8</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-x5x8</guid>
    </item>
    <item>
      <title>CVE-2025-5XX2X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang codebase and its patch]]>
      </description>
      <pubDate>Wed, 27 Aug 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-5xx2x</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-5xx2x</guid>
    </item>
    <item>
      <title>GCM Tag Truncation</title>
      <description>
        <![CDATA[This challenge covers the exploitation of tag truncation on GCM]]>
      </description>
      <pubDate>Mon, 18 Aug 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/gcm-tag-truncation</link>
      <guid>https://pentesterlab.com/exercises/gcm-tag-truncation</guid>
    </item>
    <item>
      <title>CVE-2022-24720</title>
      <description>
        <![CDATA[This exercise covers how one can leverage image processing in ActiveStorage to gain command execution.]]>
      </description>
      <pubDate>Thu, 14 Aug 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-24720</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-24720</guid>
    </item>
    <item>
      <title>CVE-2025-XX149</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Python codebase and its patch]]>
      </description>
      <pubDate>Wed, 13 Aug 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-xx149</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-xx149</guid>
    </item>
    <item>
      <title>CVE-2025-6XX4</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE published in 2025 in a go codebase and its patch]]>
      </description>
      <pubDate>Mon, 28 Jul 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-6xx4</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-6xx4</guid>
    </item>
    <item>
      <title>CVE-2025-5X3X9</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE discovered in 2025 in a golang codebase and its patch]]>
      </description>
      <pubDate>Fri, 25 Jul 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-5x3x9</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-5x3x9</guid>
    </item>
    <item>
      <title>CVE-2024-47081</title>
      <description>
      </description>
      <pubDate>Tue, 01 Jul 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-47081</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-47081</guid>
    </item>
    <item>
      <title>CVE-2025-4913X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Go codebase and its patch. The goal is to review the code to find the security issue.]]>
      </description>
      <pubDate>Mon, 30 Jun 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-4913x</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-4913x</guid>
    </item>
    <item>
      <title>CVE-2023-3219X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang project  and its patch]]>
      </description>
      <pubDate>Mon, 30 Jun 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-3219x</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-3219x</guid>
    </item>
    <item>
      <title>CVE-2025-3X5X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang project]]>
      </description>
      <pubDate>Mon, 30 Jun 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-3x5x</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-3x5x</guid>
    </item>
    <item>
      <title>CVE-2024-433XX</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Python codebase and its patch]]>
      </description>
      <pubDate>Mon, 30 Jun 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-433xx</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-433xx</guid>
    </item>
    <item>
      <title>CVE-2024-419XX</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Python codebase and its patch]]>
      </description>
      <pubDate>Mon, 30 Jun 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-419xx</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-419xx</guid>
    </item>
    <item>
      <title>Golang Code Review #06</title>
      <description>
        <![CDATA[This challenge covers the review of a vulnerable snippet of Golang and has been created to help improve your security code review skills.]]>
      </description>
      <pubDate>Wed, 04 Jun 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cr-golang-06</link>
      <guid>https://pentesterlab.com/exercises/cr-golang-06</guid>
    </item>
    <item>
      <title>Golang Code Review #08</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang and has been created to help improve your security code review skills.]]>
      </description>
      <pubDate>Wed, 04 Jun 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cr-golang-08</link>
      <guid>https://pentesterlab.com/exercises/cr-golang-08</guid>
    </item>
    <item>
      <title>Golang Code Review #10</title>
      <description>
        <![CDATA[This challenge covers the review of a simple snippet of code written in Go.]]>
      </description>
      <pubDate>Wed, 04 Jun 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cr-golang-10</link>
      <guid>https://pentesterlab.com/exercises/cr-golang-10</guid>
    </item>
    <item>
      <title>SAML: CVE-2025-25291</title>
      <description>
        <![CDATA[This exercise covers the exploitation of CVE-2025-25291 (impacting ruby-saml)]]>
      </description>
      <pubDate>Tue, 27 May 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-25291</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-25291</guid>
    </item>
    <item>
      <title>SAML: CVE-2025-29775 Signed Metadata</title>
      <description>
        <![CDATA[This exercise covers the exploitation of CVE-2025-29775 (impacting xml-crypto) without XMLResponse]]>
      </description>
      <pubDate>Tue, 22 Apr 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-29775-signed-metadata</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-29775-signed-metadata</guid>
    </item>
    <item>
      <title>CVE-2019-379X</title>
      <description>
        <![CDATA[This challenge is part of our golang code review challenges designed to teach you  security code review by reviewing patches]]>
      </description>
      <pubDate>Mon, 21 Apr 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2019-379x</link>
      <guid>https://pentesterlab.com/exercises/cve-2019-379x</guid>
    </item>
    <item>
      <title>CVE-2019-X03X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a golang codebase and its patch]]>
      </description>
      <pubDate>Mon, 21 Apr 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2019-x03x</link>
      <guid>https://pentesterlab.com/exercises/cve-2019-x03x</guid>
    </item>
    <item>
      <title>CVE-2024-6X3X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE (original vulnerable code and diff) of a real go codebase]]>
      </description>
      <pubDate>Mon, 21 Apr 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-6x3x</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-6x3x</guid>
    </item>
    <item>
      <title>CVE-2025-XX95X</title>
      <description>
        <![CDATA[This challenge is part of our go code review challenges designed to teach you  security code review by reviewing patches]]>
      </description>
      <pubDate>Mon, 21 Apr 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-xx95x</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-xx95x</guid>
    </item>
    <item>
      <title>SAML: CVE-2025-29775</title>
      <description>
        <![CDATA[This exercise covers the exploitation of CVE-2025-29775 (impacting xml-crypto)]]>
      </description>
      <pubDate>Mon, 24 Mar 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2025-29775</link>
      <guid>https://pentesterlab.com/exercises/cve-2025-29775</guid>
    </item>
    <item>
      <title>CVE-2022-37X1</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a go codebase and its patch]]>
      </description>
      <pubDate>Mon, 03 Mar 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-37x1</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-37x1</guid>
    </item>
    <item>
      <title>UUIDv1 IDOR</title>
      <description>
      </description>
      <pubDate>Thu, 27 Feb 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/uuid-idor</link>
      <guid>https://pentesterlab.com/exercises/uuid-idor</guid>
    </item>
    <item>
      <title>CVE-2023-XX463</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Go codebase and its patch]]>
      </description>
      <pubDate>Wed, 26 Feb 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-xx463</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-xx463</guid>
    </item>
    <item>
      <title>Golang Code Review #04</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang.]]>
      </description>
      <pubDate>Wed, 26 Feb 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cr-golang-04</link>
      <guid>https://pentesterlab.com/exercises/cr-golang-04</guid>
    </item>
    <item>
      <title>API Mass-Assignment 03</title>
      <description>
      </description>
      <pubDate>Thu, 06 Feb 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-mass-assignment-03</link>
      <guid>https://pentesterlab.com/exercises/api-mass-assignment-03</guid>
    </item>
    <item>
      <title>API Mass-Assignment 02</title>
      <description>
      </description>
      <pubDate>Mon, 03 Feb 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-mass-assignment-02</link>
      <guid>https://pentesterlab.com/exercises/api-mass-assignment-02</guid>
    </item>
    <item>
      <title>API Mass-Assignment 01</title>
      <description>
      </description>
      <pubDate>Mon, 03 Feb 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-mass-assignment-01</link>
      <guid>https://pentesterlab.com/exercises/api-mass-assignment-01</guid>
    </item>
    <item>
      <title>Mongo IDOR III</title>
      <description>
      </description>
      <pubDate>Mon, 20 Jan 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mongo-idor-iii</link>
      <guid>https://pentesterlab.com/exercises/mongo-idor-iii</guid>
    </item>
    <item>
      <title>Mongo IDOR IV</title>
      <description>
      </description>
      <pubDate>Mon, 20 Jan 2025 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mongo-idor-iv</link>
      <guid>https://pentesterlab.com/exercises/mongo-idor-iv</guid>
    </item>
    <item>
      <title>CVE-2024-X5X87</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a go codebase and its patch]]>
      </description>
      <pubDate>Mon, 30 Dec 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-x5x87</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-x5x87</guid>
    </item>
    <item>
      <title>API JWT REVOCATION</title>
      <description>
        <![CDATA[This exercise covers how to bypass a weak JWT Revocation Mechanism.]]>
      </description>
      <pubDate>Thu, 12 Dec 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-jwt-revocation</link>
      <guid>https://pentesterlab.com/exercises/api-jwt-revocation</guid>
    </item>
    <item>
      <title>CVE-2022-XX975</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Go codebase and its patch]]>
      </description>
      <pubDate>Thu, 28 Nov 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-xx975</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-xx975</guid>
    </item>
    <item>
      <title>Puzzle 06</title>
      <description>
        <![CDATA[Leverage a weak implementation of lowercase to access arbitrary files]]>
      </description>
      <pubDate>Tue, 26 Nov 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/puzzle-06</link>
      <guid>https://pentesterlab.com/exercises/puzzle-06</guid>
    </item>
    <item>
      <title>Puzzle 07</title>
      <description>
        <![CDATA[Leverage a weak implementation of lowercase to access arbitrary files]]>
      </description>
      <pubDate>Tue, 26 Nov 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/puzzle-07</link>
      <guid>https://pentesterlab.com/exercises/puzzle-07</guid>
    </item>
    <item>
      <title>API 18</title>
      <description>
        <![CDATA[This exercise covers how to exploit an authorization issue in an API.]]>
      </description>
      <pubDate>Fri, 15 Nov 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-18</link>
      <guid>https://pentesterlab.com/exercises/api-18</guid>
    </item>
    <item>
      <title>API 19</title>
      <description>
        <![CDATA[This exercise covers how to exploit an authorization issue in an API.]]>
      </description>
      <pubDate>Fri, 15 Nov 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-19</link>
      <guid>https://pentesterlab.com/exercises/api-19</guid>
    </item>
    <item>
      <title>API 20</title>
      <description>
        <![CDATA[This exercise covers how to exploit an authorization issue in an API.]]>
      </description>
      <pubDate>Fri, 15 Nov 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-20</link>
      <guid>https://pentesterlab.com/exercises/api-20</guid>
    </item>
    <item>
      <title>API 16</title>
      <description>
        <![CDATA[This exercise covers how to exploit an authorization issue in an API.]]>
      </description>
      <pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-16</link>
      <guid>https://pentesterlab.com/exercises/api-16</guid>
    </item>
    <item>
      <title>API 17</title>
      <description>
        <![CDATA[This exercise covers how to exploit an authorization issue in an API.]]>
      </description>
      <pubDate>Tue, 12 Nov 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-17</link>
      <guid>https://pentesterlab.com/exercises/api-17</guid>
    </item>
    <item>
      <title>GraphQL Authorization 01</title>
      <description>
        <![CDATA[This exercise covers a simple authorization issue in a GraphQL application.]]>
      </description>
      <pubDate>Mon, 11 Nov 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/graphql-autho-01</link>
      <guid>https://pentesterlab.com/exercises/graphql-autho-01</guid>
    </item>
    <item>
      <title>GraphQL Authorization 02</title>
      <description>
        <![CDATA[This exercise covers a simple authorization issue in a GraphQL application.]]>
      </description>
      <pubDate>Mon, 11 Nov 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/graphql-autho-02</link>
      <guid>https://pentesterlab.com/exercises/graphql-autho-02</guid>
    </item>
    <item>
      <title>Golang Code Review #01</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang.]]>
      </description>
      <pubDate>Thu, 31 Oct 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cr-golang-01</link>
      <guid>https://pentesterlab.com/exercises/cr-golang-01</guid>
    </item>
    <item>
      <title>Golang Code Review #03</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang.]]>
      </description>
      <pubDate>Thu, 31 Oct 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cr-golang-03</link>
      <guid>https://pentesterlab.com/exercises/cr-golang-03</guid>
    </item>
    <item>
      <title>CVE-2022-2X8XX</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang codebase and its patch]]>
      </description>
      <pubDate>Wed, 23 Oct 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-2x8xx</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-2x8xx</guid>
    </item>
    <item>
      <title>CVE-2022-X10X8</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang codebase and its patch]]>
      </description>
      <pubDate>Wed, 23 Oct 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-x10x8</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-x10x8</guid>
    </item>
    <item>
      <title>CVE-2024-X90X6</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang codebase and its patch]]>
      </description>
      <pubDate>Wed, 23 Oct 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-x90x6</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-x90x6</guid>
    </item>
    <item>
      <title>ORM LEAK: SQLite</title>
      <description>
        <![CDATA[This exercise covers how to exploit an ORM leak vulnerability]]>
      </description>
      <pubDate>Tue, 01 Oct 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/orm-leak-03</link>
      <guid>https://pentesterlab.com/exercises/orm-leak-03</guid>
    </item>
    <item>
      <title>CVE-2022-X87X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang codebase and its patch]]>
      </description>
      <pubDate>Sat, 28 Sep 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-x87x</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-x87x</guid>
    </item>
    <item>
      <title>CVE-2023-51XX2</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang codebase and its patch]]>
      </description>
      <pubDate>Sat, 28 Sep 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-51xx2</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-51xx2</guid>
    </item>
    <item>
      <title>CVE-2024-2791X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang codebase and its patch]]>
      </description>
      <pubDate>Sat, 28 Sep 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-2791x</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-2791x</guid>
    </item>
    <item>
      <title>ORM LEAK 02</title>
      <description>
        <![CDATA[This exercise covers how to exploit an ORM leak vulnerability]]>
      </description>
      <pubDate>Fri, 27 Sep 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/orm-leak-02</link>
      <guid>https://pentesterlab.com/exercises/orm-leak-02</guid>
    </item>
    <item>
      <title>Puzzle 05</title>
      <description>
        <![CDATA[Authentication Bypass using an SQL injection without or 1=1]]>
      </description>
      <pubDate>Fri, 13 Sep 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/puzzle-05</link>
      <guid>https://pentesterlab.com/exercises/puzzle-05</guid>
    </item>
    <item>
      <title>CVE-2023-X5821</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Go codebase and its patch]]>
      </description>
      <pubDate>Thu, 29 Aug 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-x5821</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-x5821</guid>
    </item>
    <item>
      <title>CVE-2024-X3X06</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Go codebase and its patch]]>
      </description>
      <pubDate>Thu, 29 Aug 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-x3x06</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-x3x06</guid>
    </item>
    <item>
      <title>CVE-2022-2X24X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 26 Aug 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-2x24x</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-2x24x</guid>
    </item>
    <item>
      <title>CVE-2023-3X4X6</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 26 Aug 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-3x4x6</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-3x4x6</guid>
    </item>
    <item>
      <title>CVE-2022-4x3x5</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 26 Aug 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-4x3x5</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-4x3x5</guid>
    </item>
    <item>
      <title>Puzzle 03</title>
      <description>
        <![CDATA[Find and exploit a Golang vulnerability inspired by CVE-2022-31683]]>
      </description>
      <pubDate>Tue, 20 Aug 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/puzzle-03</link>
      <guid>https://pentesterlab.com/exercises/puzzle-03</guid>
    </item>
    <item>
      <title>Java Code Review 14</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Mon, 19 Aug 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-14</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-14</guid>
    </item>
    <item>
      <title>Java Code Review 15</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Mon, 19 Aug 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-15</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-15</guid>
    </item>
    <item>
      <title>Java Code Review 16</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Mon, 19 Aug 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-16</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-16</guid>
    </item>
    <item>
      <title>ORM LEAK 01</title>
      <description>
        <![CDATA[This exercise covers how to exploit a simple ORM leak.]]>
      </description>
      <pubDate>Mon, 29 Jul 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/orm-leak-01</link>
      <guid>https://pentesterlab.com/exercises/orm-leak-01</guid>
    </item>
    <item>
      <title>Java Code Review 11</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-11</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-11</guid>
    </item>
    <item>
      <title>Java Code Review 12</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-12</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-12</guid>
    </item>
    <item>
      <title>Java Code Review 13</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Mon, 22 Jul 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-13</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-13</guid>
    </item>
    <item>
      <title>Java Code Review 10</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Fri, 21 Jun 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-10</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-10</guid>
    </item>
    <item>
      <title>CVE-2023-4X25X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Fri, 21 Jun 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-4x25x</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-4x25x</guid>
    </item>
    <item>
      <title>Puzzle 04</title>
      <description>
        <![CDATA[Leverage SQL LIKE to gain access to sensitive information]]>
      </description>
      <pubDate>Wed, 19 Jun 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/puzzle-04</link>
      <guid>https://pentesterlab.com/exercises/puzzle-04</guid>
    </item>
    <item>
      <title>CVE-2023-5X38X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 11 Jun 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-5x38x</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-5x38x</guid>
    </item>
    <item>
      <title>CVE-2024-2X31X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 11 Jun 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-2x31x</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-2x31x</guid>
    </item>
    <item>
      <title>CVE-2024-X875X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 11 Jun 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-x875x</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-x875x</guid>
    </item>
    <item>
      <title>CVE-2022-0415</title>
      <description>
        <![CDATA[Exploit CVE-2022-0415 to gain code execution in Gogs]]>
      </description>
      <pubDate>Tue, 28 May 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-0415</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-0415</guid>
    </item>
    <item>
      <title>Java Code Review 07</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Thu, 09 May 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-07</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-07</guid>
    </item>
    <item>
      <title>Java Code Review 08</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Thu, 09 May 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-08</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-08</guid>
    </item>
    <item>
      <title>Java Code Review 09</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Thu, 09 May 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-09</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-09</guid>
    </item>
    <item>
      <title>Puzzle 01</title>
      <description>
        <![CDATA[Find the XSS by leveraging backreferences in a regular expression]]>
      </description>
      <pubDate>Tue, 07 May 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/puzzle-01</link>
      <guid>https://pentesterlab.com/exercises/puzzle-01</guid>
    </item>
    <item>
      <title>Puzzle 02</title>
      <description>
        <![CDATA[Leverage a PHP trick to bypass CSP]]>
      </description>
      <pubDate>Tue, 07 May 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/puzzle-02</link>
      <guid>https://pentesterlab.com/exercises/puzzle-02</guid>
    </item>
    <item>
      <title>API 13</title>
      <description>
        <![CDATA[This exercise covers a complex filter bypass in API.]]>
      </description>
      <pubDate>Fri, 19 Apr 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-13</link>
      <guid>https://pentesterlab.com/exercises/api-13</guid>
    </item>
    <item>
      <title>API 14</title>
      <description>
        <![CDATA[This exercise covers how to exploit a leaked encrypted password with an API.]]>
      </description>
      <pubDate>Fri, 19 Apr 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-14</link>
      <guid>https://pentesterlab.com/exercises/api-14</guid>
    </item>
    <item>
      <title>API 15</title>
      <description>
        <![CDATA[This exercise covers how to exploit a leaked encrypted password with an API.]]>
      </description>
      <pubDate>Fri, 19 Apr 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-15</link>
      <guid>https://pentesterlab.com/exercises/api-15</guid>
    </item>
    <item>
      <title>Java Code Review 04</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Tue, 09 Apr 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-04</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-04</guid>
    </item>
    <item>
      <title>Java Code Review 05</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Tue, 09 Apr 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-05</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-05</guid>
    </item>
    <item>
      <title>Java Code Review 06</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Tue, 09 Apr 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-06</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-06</guid>
    </item>
    <item>
      <title>API 10</title>
      <description>
        <![CDATA[This exercise covers a common filter bypass in API.]]>
      </description>
      <pubDate>Sun, 31 Mar 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-10</link>
      <guid>https://pentesterlab.com/exercises/api-10</guid>
    </item>
    <item>
      <title>API 11</title>
      <description>
        <![CDATA[This exercise covers a common filter bypass in API.]]>
      </description>
      <pubDate>Sun, 31 Mar 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-11</link>
      <guid>https://pentesterlab.com/exercises/api-11</guid>
    </item>
    <item>
      <title>API 12</title>
      <description>
        <![CDATA[This exercise covers a common filter bypass in API.]]>
      </description>
      <pubDate>Sun, 31 Mar 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-12</link>
      <guid>https://pentesterlab.com/exercises/api-12</guid>
    </item>
    <item>
      <title>Java Code Review 01</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Thu, 14 Mar 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-01</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-01</guid>
    </item>
    <item>
      <title>Java Code Review 02</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Thu, 14 Mar 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-02</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-02</guid>
    </item>
    <item>
      <title>Java Code Review 03</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Java]]>
      </description>
      <pubDate>Thu, 14 Mar 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-code-review-03</link>
      <guid>https://pentesterlab.com/exercises/java-code-review-03</guid>
    </item>
    <item>
      <title>CVE-2024-x730x</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang.]]>
      </description>
      <pubDate>Wed, 13 Mar 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2024-x730x</link>
      <guid>https://pentesterlab.com/exercises/cve-2024-x730x</guid>
    </item>
    <item>
      <title>CVE-2023-28XX9</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Golang codebase and its patch]]>
      </description>
      <pubDate>Wed, 13 Mar 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-28xx9</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-28xx9</guid>
    </item>
    <item>
      <title>JSON Web Token XV: CVE-2022-39227</title>
      <description>
        <![CDATA[This exercise covers the exploitation of polyglot token against python_jwt (CVE-2022-39227)]]>
      </description>
      <pubDate>Mon, 26 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-xv</link>
      <guid>https://pentesterlab.com/exercises/jwt-xv</guid>
    </item>
    <item>
      <title>Python Code Review 06</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Python]]>
      </description>
      <pubDate>Mon, 26 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-code-review-06</link>
      <guid>https://pentesterlab.com/exercises/python-code-review-06</guid>
    </item>
    <item>
      <title>Python Code Review 07</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Python]]>
      </description>
      <pubDate>Mon, 26 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-code-review-07</link>
      <guid>https://pentesterlab.com/exercises/python-code-review-07</guid>
    </item>
    <item>
      <title>CVE-2023-X48X9</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 22 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-x48x9</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-x48x9</guid>
    </item>
    <item>
      <title>CVE-2009-387X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 22 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2009-387x</link>
      <guid>https://pentesterlab.com/exercises/cve-2009-387x</guid>
    </item>
    <item>
      <title>CVE-2023-5143X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 22 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-5143x</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-5143x</guid>
    </item>
    <item>
      <title>Python Code Review 04</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Python]]>
      </description>
      <pubDate>Wed, 21 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-code-review-04</link>
      <guid>https://pentesterlab.com/exercises/python-code-review-04</guid>
    </item>
    <item>
      <title>Python Code Review 01</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Python]]>
      </description>
      <pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-code-review-01</link>
      <guid>https://pentesterlab.com/exercises/python-code-review-01</guid>
    </item>
    <item>
      <title>Python Code Review 02</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Python]]>
      </description>
      <pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-code-review-02</link>
      <guid>https://pentesterlab.com/exercises/python-code-review-02</guid>
    </item>
    <item>
      <title>Python Code Review 03</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Python]]>
      </description>
      <pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-code-review-03</link>
      <guid>https://pentesterlab.com/exercises/python-code-review-03</guid>
    </item>
    <item>
      <title>Python Code Review 05</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Python]]>
      </description>
      <pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-code-review-05</link>
      <guid>https://pentesterlab.com/exercises/python-code-review-05</guid>
    </item>
    <item>
      <title>Python Code Review 09</title>
      <description>
        <![CDATA[This challenge covers the review of a simple codebase in Python]]>
      </description>
      <pubDate>Tue, 20 Feb 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-code-review-09</link>
      <guid>https://pentesterlab.com/exercises/python-code-review-09</guid>
    </item>
    <item>
      <title>GHSA-95XX</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 30 Jan 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ghsa-95xx</link>
      <guid>https://pentesterlab.com/exercises/ghsa-95xx</guid>
    </item>
    <item>
      <title>CVE-2022-4x13x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 30 Jan 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-4x13x</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-4x13x</guid>
    </item>
    <item>
      <title>CVE-2023-46XX2</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 30 Jan 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-46xx2</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-46xx2</guid>
    </item>
    <item>
      <title>Java Serialize 06</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn Java Serialisation exploitation]]>
      </description>
      <pubDate>Mon, 29 Jan 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jserialize-06</link>
      <guid>https://pentesterlab.com/exercises/jserialize-06</guid>
    </item>
    <item>
      <title>API 09</title>
      <description>
        <![CDATA[This exercise covers how one can inspect HTTP responses to identify information leaks.]]>
      </description>
      <pubDate>Tue, 09 Jan 2024 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-09</link>
      <guid>https://pentesterlab.com/exercises/api-09</guid>
    </item>
    <item>
      <title>Java Serialize 04</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn Java Serialisation exploitation]]>
      </description>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jserialize-04</link>
      <guid>https://pentesterlab.com/exercises/jserialize-04</guid>
    </item>
    <item>
      <title>Java Serialize 05</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn Java Serialisation exploitation]]>
      </description>
      <pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jserialize-05</link>
      <guid>https://pentesterlab.com/exercises/jserialize-05</guid>
    </item>
    <item>
      <title>Cache Poisoning 01</title>
      <description>
        <![CDATA[This exercise details how to exploit an application vulnerable to cache poisoning]]>
      </description>
      <pubDate>Wed, 13 Dec 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cache-poisoning-01</link>
      <guid>https://pentesterlab.com/exercises/cache-poisoning-01</guid>
    </item>
    <item>
      <title>Cache Deception 02</title>
      <description>
        <![CDATA[This exercise details how to exploit an application vulnerable to cache deception]]>
      </description>
      <pubDate>Wed, 29 Nov 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cache-deception-02</link>
      <guid>https://pentesterlab.com/exercises/cache-deception-02</guid>
    </item>
    <item>
      <title>CVE-2023-XXX83</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 13 Nov 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-xxx83</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-xxx83</guid>
    </item>
    <item>
      <title>CVE-2023-289X6</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 13 Nov 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-289x6</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-289x6</guid>
    </item>
    <item>
      <title>CVE-2023-350XX</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 13 Nov 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-350xx</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-350xx</guid>
    </item>
    <item>
      <title>CVE-2022-XX910</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 31 Oct 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-xx910</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-xx910</guid>
    </item>
    <item>
      <title>CVE-2022-342XX</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 31 Oct 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-342xx</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-342xx</guid>
    </item>
    <item>
      <title>Cache Deception 01</title>
      <description>
        <![CDATA[This exercise details how to exploit an application vulnerable to cache deception]]>
      </description>
      <pubDate>Fri, 20 Oct 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cache-deception-01</link>
      <guid>https://pentesterlab.com/exercises/cache-deception-01</guid>
    </item>
    <item>
      <title>Golang Code Review #09</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang.]]>
      </description>
      <pubDate>Thu, 05 Oct 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cr-golang-09</link>
      <guid>https://pentesterlab.com/exercises/cr-golang-09</guid>
    </item>
    <item>
      <title>Golang Code Review #02</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang.]]>
      </description>
      <pubDate>Thu, 05 Oct 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cr-golang-02</link>
      <guid>https://pentesterlab.com/exercises/cr-golang-02</guid>
    </item>
    <item>
      <title>Golang Code Review #05</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang.]]>
      </description>
      <pubDate>Wed, 04 Oct 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cr-golang-05</link>
      <guid>https://pentesterlab.com/exercises/cr-golang-05</guid>
    </item>
    <item>
      <title>CVE-2022-X50X6</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 18 Sep 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-x50x6</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-x50x6</guid>
    </item>
    <item>
      <title>CVE-2023-25X4X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 18 Sep 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-25x4x</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-25x4x</guid>
    </item>
    <item>
      <title>CVE-202X-2561X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 18 Sep 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-202x-2561x</link>
      <guid>https://pentesterlab.com/exercises/cve-202x-2561x</guid>
    </item>
    <item>
      <title>CVE-2022-x0x08</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 31 Aug 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-x0x08</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-x0x08</guid>
    </item>
    <item>
      <title>CVE-2022-4504x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 31 Aug 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-4504x</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-4504x</guid>
    </item>
    <item>
      <title>CVE-2022-X51X3</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 31 Aug 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-x51x3</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-x51x3</guid>
    </item>
    <item>
      <title>CVE-2007-546X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 15 Aug 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2007-546x</link>
      <guid>https://pentesterlab.com/exercises/cve-2007-546x</guid>
    </item>
    <item>
      <title>CVE-2011-XX61</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 15 Aug 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2011-xx61</link>
      <guid>https://pentesterlab.com/exercises/cve-2011-xx61</guid>
    </item>
    <item>
      <title>CVE-2006-6X6X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 15 Aug 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2006-6x6x</link>
      <guid>https://pentesterlab.com/exercises/cve-2006-6x6x</guid>
    </item>
    <item>
      <title>Java Serialize 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn Java Serialisation exploitation]]>
      </description>
      <pubDate>Mon, 24 Jul 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jserialize-02</link>
      <guid>https://pentesterlab.com/exercises/jserialize-02</guid>
    </item>
    <item>
      <title>Java Serialize 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn Java Serialisation exploitation]]>
      </description>
      <pubDate>Mon, 24 Jul 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jserialize-03</link>
      <guid>https://pentesterlab.com/exercises/jserialize-03</guid>
    </item>
    <item>
      <title>CVE-2014-7X09</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 10 Jul 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2014-7x09</link>
      <guid>https://pentesterlab.com/exercises/cve-2014-7x09</guid>
    </item>
    <item>
      <title>CVE-2020-9X8X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 10 Jul 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2020-9x8x</link>
      <guid>https://pentesterlab.com/exercises/cve-2020-9x8x</guid>
    </item>
    <item>
      <title>CVE-2018-XX34</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 10 Jul 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2018-xx34</link>
      <guid>https://pentesterlab.com/exercises/cve-2018-xx34</guid>
    </item>
    <item>
      <title>CVE-2012-5XX3</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 29 Jun 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2012-5xx3</link>
      <guid>https://pentesterlab.com/exercises/cve-2012-5xx3</guid>
    </item>
    <item>
      <title>CVE-2022-X41X9</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 29 Jun 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-x41x9</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-x41x9</guid>
    </item>
    <item>
      <title>CVE-2009-26X3</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 29 Jun 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2009-26x3</link>
      <guid>https://pentesterlab.com/exercises/cve-2009-26x3</guid>
    </item>
    <item>
      <title>CVE-2022-357X1</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 22 Jun 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-357x1</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-357x1</guid>
    </item>
    <item>
      <title>CVE-2023-30XX1</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 22 Jun 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-30xx1</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-30xx1</guid>
    </item>
    <item>
      <title>CVE-2023-2X8X1</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 22 Jun 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-2x8x1</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-2x8x1</guid>
    </item>
    <item>
      <title>SAML: PySAML2 SSRF</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a SSRF in PySAML2]]>
      </description>
      <pubDate>Wed, 14 Jun 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pysaml2-ssrf</link>
      <guid>https://pentesterlab.com/exercises/pysaml2-ssrf</guid>
    </item>
    <item>
      <title>CVE-2022-378xx</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 29 May 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-378xx</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-378xx</guid>
    </item>
    <item>
      <title>CVE-2022-x0x09</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 29 May 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-x0x09</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-x0x09</guid>
    </item>
    <item>
      <title>CVE-2018-8x14</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Mon, 29 May 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2018-8x14</link>
      <guid>https://pentesterlab.com/exercises/cve-2018-8x14</guid>
    </item>
    <item>
      <title>JWT Algorithm Confusion with ECDSA Public Key Recovery</title>
      <description>
        <![CDATA[This exercise covers the exploitation of algorithm confusion when no public key is available with a ECDSA key]]>
      </description>
      <pubDate>Tue, 02 May 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-algorithm-confusion-ecdsa-key-recovery</link>
      <guid>https://pentesterlab.com/exercises/jwt-algorithm-confusion-ecdsa-key-recovery</guid>
    </item>
    <item>
      <title>CVE-2014-X80X</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 27 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2014-x80x</link>
      <guid>https://pentesterlab.com/exercises/cve-2014-x80x</guid>
    </item>
    <item>
      <title>CVE-2015-3XX0</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 27 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2015-3xx0</link>
      <guid>https://pentesterlab.com/exercises/cve-2015-3xx0</guid>
    </item>
    <item>
      <title>CVE-2022-458X1</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Thu, 27 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-458x1</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-458x1</guid>
    </item>
    <item>
      <title>SAML: CVE-2021-21239</title>
      <description>
        <![CDATA[This exercise covers the exploitation of CVE-2021-21239 (PySAML2)]]>
      </description>
      <pubDate>Mon, 24 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-21239</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-21239</guid>
    </item>
    <item>
      <title>CVE-2022-393XX</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 11 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-393xx</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-393xx</guid>
    </item>
    <item>
      <title>CVE-2023-2XX60</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 11 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-2xx60</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-2xx60</guid>
    </item>
    <item>
      <title>CVE-2023-2XX61</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE in a Java codebase and its patch]]>
      </description>
      <pubDate>Tue, 11 Apr 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2023-2xx61</link>
      <guid>https://pentesterlab.com/exercises/cve-2023-2xx61</guid>
    </item>
    <item>
      <title>SAML: Malicious IDP</title>
      <description>
        <![CDATA[This exercise covers the creation of a malicious IDP to forge an assertion]]>
      </description>
      <pubDate>Thu, 30 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml-xii</link>
      <guid>https://pentesterlab.com/exercises/saml-xii</guid>
    </item>
    <item>
      <title>DOMPDF RCE IV</title>
      <description>
        <![CDATA[This exercise covers the automation of the exploitation of a vulnerability in the DOMPDF library]]>
      </description>
      <pubDate>Wed, 22 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/dompdf-rce-iv</link>
      <guid>https://pentesterlab.com/exercises/dompdf-rce-iv</guid>
    </item>
    <item>
      <title>SAML: Signature Wrapping III</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a Signature Wrapping Issue in passport-saml (CVE-2022-39299)]]>
      </description>
      <pubDate>Wed, 08 Mar 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml-x</link>
      <guid>https://pentesterlab.com/exercises/saml-x</guid>
    </item>
    <item>
      <title>XSL Java</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a Java application using XSL ]]>
      </description>
      <pubDate>Thu, 23 Feb 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xsl-java</link>
      <guid>https://pentesterlab.com/exercises/xsl-java</guid>
    </item>
    <item>
      <title>DOMPDF RCE III</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a vulnerability in the DOMPDF library]]>
      </description>
      <pubDate>Thu, 09 Feb 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/dompdf-rce-iii</link>
      <guid>https://pentesterlab.com/exercises/dompdf-rce-iii</guid>
    </item>
    <item>
      <title>XSL PHP V</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a PHP application using XSL ]]>
      </description>
      <pubDate>Sun, 29 Jan 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xsl-php-v</link>
      <guid>https://pentesterlab.com/exercises/xsl-php-v</guid>
    </item>
    <item>
      <title>API Payments 07</title>
      <description>
        <![CDATA[This exercise covers a way to manipulate a shopping cart to lower the total amount]]>
      </description>
      <pubDate>Sun, 15 Jan 2023 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-payments-07</link>
      <guid>https://pentesterlab.com/exercises/api-payments-07</guid>
    </item>
    <item>
      <title>CVE-2021-22204: Exiftool RCE II</title>
      <description>
        <![CDATA[This exercise covers how you can gain code execution when an application uses exiftool on user-controlled files]]>
      </description>
      <pubDate>Wed, 28 Dec 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-22204-ii</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-22204-ii</guid>
    </item>
    <item>
      <title>XSL PHP IV</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a PHP application using XSL ]]>
      </description>
      <pubDate>Mon, 26 Dec 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xsl-php-iv</link>
      <guid>https://pentesterlab.com/exercises/xsl-php-iv</guid>
    </item>
    <item>
      <title>API Payments 06</title>
      <description>
        <![CDATA[This exercise covers a simple payments bypass.]]>
      </description>
      <pubDate>Wed, 14 Dec 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-payments-06</link>
      <guid>https://pentesterlab.com/exercises/api-payments-06</guid>
    </item>
    <item>
      <title>CVE-2022-39224</title>
      <description>
        <![CDATA[This exercise covers the exploitation of CVE-2022-39224]]>
      </description>
      <pubDate>Thu, 24 Nov 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-39224</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-39224</guid>
    </item>
    <item>
      <title>XSL PHP III</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a PHP application using XSL ]]>
      </description>
      <pubDate>Thu, 17 Nov 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xsl-php-iii</link>
      <guid>https://pentesterlab.com/exercises/xsl-php-iii</guid>
    </item>
    <item>
      <title>DOMPDF RCE II</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a vulnerability in the DOMPDF library]]>
      </description>
      <pubDate>Wed, 09 Nov 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/dompdf-rce-ii</link>
      <guid>https://pentesterlab.com/exercises/dompdf-rce-ii</guid>
    </item>
    <item>
      <title>DOMPDF RCE</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a vulnerability in the DOMPDF library]]>
      </description>
      <pubDate>Fri, 28 Oct 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/dompdf-rce</link>
      <guid>https://pentesterlab.com/exercises/dompdf-rce</guid>
    </item>
    <item>
      <title>API Payments 05</title>
      <description>
        <![CDATA[This exercise covers how to abuse a shopping cart allowing users to apply a voucher.]]>
      </description>
      <pubDate>Mon, 24 Oct 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-payments-05</link>
      <guid>https://pentesterlab.com/exercises/api-payments-05</guid>
    </item>
    <item>
      <title>XSL PHP II</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a PHP application using XSL ]]>
      </description>
      <pubDate>Tue, 11 Oct 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xsl-php-ii</link>
      <guid>https://pentesterlab.com/exercises/xsl-php-ii</guid>
    </item>
    <item>
      <title>API Payments 04</title>
      <description>
        <![CDATA[This exercise covers how to abuse a shopping cart allowing users to apply a voucher..]]>
      </description>
      <pubDate>Wed, 28 Sep 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-payments-04</link>
      <guid>https://pentesterlab.com/exercises/api-payments-04</guid>
    </item>
    <item>
      <title>XSL PHP</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a PHP application using XSL ]]>
      </description>
      <pubDate>Sun, 25 Sep 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xsl-php</link>
      <guid>https://pentesterlab.com/exercises/xsl-php</guid>
    </item>
    <item>
      <title>API Payments 03</title>
      <description>
        <![CDATA[This exercise covers a simple payments bypass.]]>
      </description>
      <pubDate>Mon, 29 Aug 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-payments-03</link>
      <guid>https://pentesterlab.com/exercises/api-payments-03</guid>
    </item>
    <item>
      <title>Code Review 18</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Tue, 23 Aug 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-18</link>
      <guid>https://pentesterlab.com/exercises/codereview-18</guid>
    </item>
    <item>
      <title>CVE-2020-13xxx</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Tue, 23 Aug 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2020-13xxx</link>
      <guid>https://pentesterlab.com/exercises/cve-2020-13xxx</guid>
    </item>
    <item>
      <title>CVE-2008-5x8x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Thu, 11 Aug 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2008-5x8x</link>
      <guid>https://pentesterlab.com/exercises/cve-2008-5x8x</guid>
    </item>
    <item>
      <title>CVE-2022-3x7x1</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Thu, 11 Aug 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-3x7x1</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-3x7x1</guid>
    </item>
    <item>
      <title>Python Snippet #02</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Python]]>
      </description>
      <pubDate>Wed, 10 Aug 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-02</link>
      <guid>https://pentesterlab.com/exercises/python-02</guid>
    </item>
    <item>
      <title>Java Snippet #10</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Wed, 03 Aug 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-10</link>
      <guid>https://pentesterlab.com/exercises/java-10</guid>
    </item>
    <item>
      <title>Java Snippet #11</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Wed, 03 Aug 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-11</link>
      <guid>https://pentesterlab.com/exercises/java-11</guid>
    </item>
    <item>
      <title>Java Snippet #12</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Wed, 03 Aug 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-12</link>
      <guid>https://pentesterlab.com/exercises/java-12</guid>
    </item>
    <item>
      <title>API Payments 02</title>
      <description>
        <![CDATA[This exercise covers a simple payments bypass.]]>
      </description>
      <pubDate>Sat, 30 Jul 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-payments-02</link>
      <guid>https://pentesterlab.com/exercises/api-payments-02</guid>
    </item>
    <item>
      <title>GCM Nonce Reuse</title>
      <description>
        <![CDATA[This challenge covers the impact of nonce reuse on GCM]]>
      </description>
      <pubDate>Tue, 26 Jul 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/gcm-nonce</link>
      <guid>https://pentesterlab.com/exercises/gcm-nonce</guid>
    </item>
    <item>
      <title>CVE-2019-5x2x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Mon, 18 Jul 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2019-5x2x</link>
      <guid>https://pentesterlab.com/exercises/cve-2019-5x2x</guid>
    </item>
    <item>
      <title>Java Snippet #07</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Sun, 03 Jul 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-07</link>
      <guid>https://pentesterlab.com/exercises/java-07</guid>
    </item>
    <item>
      <title>Java Snippet #08</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Sun, 03 Jul 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-08</link>
      <guid>https://pentesterlab.com/exercises/java-08</guid>
    </item>
    <item>
      <title>Java Snippet #09</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Sun, 03 Jul 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-09</link>
      <guid>https://pentesterlab.com/exercises/java-09</guid>
    </item>
    <item>
      <title>API Payments 01</title>
      <description>
        <![CDATA[This exercise covers a simple payments bypass.]]>
      </description>
      <pubDate>Tue, 28 Jun 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-payments-01</link>
      <guid>https://pentesterlab.com/exercises/api-payments-01</guid>
    </item>
    <item>
      <title>CVE-2022-26xx9</title>
      <description>
        <![CDATA[This challenge covers a vulnerable snippet in a real Java application]]>
      </description>
      <pubDate>Thu, 16 Jun 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-26xx9</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-26xx9</guid>
    </item>
    <item>
      <title>Python Snippet #07</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Python]]>
      </description>
      <pubDate>Mon, 06 Jun 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-07</link>
      <guid>https://pentesterlab.com/exercises/python-07</guid>
    </item>
    <item>
      <title>Python Snippet #08</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Python]]>
      </description>
      <pubDate>Mon, 06 Jun 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-08</link>
      <guid>https://pentesterlab.com/exercises/python-08</guid>
    </item>
    <item>
      <title>Python Snippet #09</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Python]]>
      </description>
      <pubDate>Mon, 06 Jun 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-09</link>
      <guid>https://pentesterlab.com/exercises/python-09</guid>
    </item>
    <item>
      <title>Mongo IDOR</title>
      <description>
        <![CDATA[This challenge covers how to exploit an IDOR when Mongo IDs are used ]]>
      </description>
      <pubDate>Mon, 30 May 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mongo-idor</link>
      <guid>https://pentesterlab.com/exercises/mongo-idor</guid>
    </item>
    <item>
      <title>CVE-2008-5x8x_ii</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Mon, 16 May 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2008-5x8x-ii</link>
      <guid>https://pentesterlab.com/exercises/cve-2008-5x8x-ii</guid>
    </item>
    <item>
      <title>CVE-2005-2x8x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Mon, 16 May 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2005-2x8x</link>
      <guid>https://pentesterlab.com/exercises/cve-2005-2x8x</guid>
    </item>
    <item>
      <title>Golang Snippet #01</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Thu, 12 May 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-01</link>
      <guid>https://pentesterlab.com/exercises/golang-01</guid>
    </item>
    <item>
      <title>Java Snippet #06</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Thu, 12 May 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-06</link>
      <guid>https://pentesterlab.com/exercises/java-06</guid>
    </item>
    <item>
      <title>Python Snippet #06</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Python]]>
      </description>
      <pubDate>Thu, 12 May 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-06</link>
      <guid>https://pentesterlab.com/exercises/python-06</guid>
    </item>
    <item>
      <title>CVE-2022-21449</title>
      <description>
        <![CDATA[This exercise covers the exploitation of CVE-2022-21449 against a Java Application relying on JWT]]>
      </description>
      <pubDate>Sat, 30 Apr 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-21449</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-21449</guid>
    </item>
    <item>
      <title>CVE-2021-33564 Argument Injection in Ruby Dragonfly</title>
      <description>
        <![CDATA[This exercise covers how you can get arbitrary file read using CVE-2021-33564 against Refinery CMS]]>
      </description>
      <pubDate>Tue, 26 Apr 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-33564</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-33564</guid>
    </item>
    <item>
      <title>CVE-2021-45xx9</title>
      <description>
        <![CDATA[This challenge covers a vulnerable snippet in a real Python application]]>
      </description>
      <pubDate>Fri, 22 Apr 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-45xx9</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-45xx9</guid>
    </item>
    <item>
      <title>Mongo IDOR II</title>
      <description>
        <![CDATA[This challenge covers how to recover a Mongo ID to leverage an IDOR]]>
      </description>
      <pubDate>Fri, 22 Apr 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mongo-idor-ii</link>
      <guid>https://pentesterlab.com/exercises/mongo-idor-ii</guid>
    </item>
    <item>
      <title>PHP Snippet #07</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in PHP]]>
      </description>
      <pubDate>Mon, 11 Apr 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/php-07</link>
      <guid>https://pentesterlab.com/exercises/php-07</guid>
    </item>
    <item>
      <title>PHP Snippet #08</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in PHP]]>
      </description>
      <pubDate>Mon, 11 Apr 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/php-08</link>
      <guid>https://pentesterlab.com/exercises/php-08</guid>
    </item>
    <item>
      <title>PHP Snippet #09</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in PHP]]>
      </description>
      <pubDate>Mon, 11 Apr 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/php-09</link>
      <guid>https://pentesterlab.com/exercises/php-09</guid>
    </item>
    <item>
      <title>Python Snippet #03</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Python]]>
      </description>
      <pubDate>Wed, 23 Mar 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-03</link>
      <guid>https://pentesterlab.com/exercises/python-03</guid>
    </item>
    <item>
      <title>Python Snippet #04</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Python]]>
      </description>
      <pubDate>Wed, 23 Mar 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-04</link>
      <guid>https://pentesterlab.com/exercises/python-04</guid>
    </item>
    <item>
      <title>Python Snippet #05</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Python]]>
      </description>
      <pubDate>Wed, 23 Mar 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-05</link>
      <guid>https://pentesterlab.com/exercises/python-05</guid>
    </item>
    <item>
      <title>CVE-2021-39x3x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Tue, 15 Mar 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-39x3x</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-39x3x</guid>
    </item>
    <item>
      <title>CVE-2022-21724: JDBC RCE PostgreSQL</title>
      <description>
        <![CDATA[This challenge covers how to gain code execution by leveraging a JDBC connection string with PostgreSQL]]>
      </description>
      <pubDate>Thu, 10 Mar 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2022-21724</link>
      <guid>https://pentesterlab.com/exercises/cve-2022-21724</guid>
    </item>
    <item>
      <title>Java Snippet #04</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Mon, 28 Feb 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-04</link>
      <guid>https://pentesterlab.com/exercises/java-04</guid>
    </item>
    <item>
      <title>Java Snippet #05</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Mon, 28 Feb 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-05</link>
      <guid>https://pentesterlab.com/exercises/java-05</guid>
    </item>
    <item>
      <title>Ox Remote Code Execution II</title>
      <description>
        <![CDATA[This exercise covers how you can gain code execution when an application is using Ox to deserialize data and is running on Ruby 2.7]]>
      </description>
      <pubDate>Thu, 24 Feb 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ox-rce-ii</link>
      <guid>https://pentesterlab.com/exercises/ox-rce-ii</guid>
    </item>
    <item>
      <title>CVE-2009-3x8x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Mon, 21 Feb 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2009-3x8x</link>
      <guid>https://pentesterlab.com/exercises/cve-2009-3x8x</guid>
    </item>
    <item>
      <title>HTTP 41</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Tue, 08 Feb 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-41</link>
      <guid>https://pentesterlab.com/exercises/http-41</guid>
    </item>
    <item>
      <title>HTTP 42</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Tue, 08 Feb 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-42</link>
      <guid>https://pentesterlab.com/exercises/http-42</guid>
    </item>
    <item>
      <title>HTTP 43</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Tue, 08 Feb 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-43</link>
      <guid>https://pentesterlab.com/exercises/http-43</guid>
    </item>
    <item>
      <title>CVE-2021-381xx</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Sun, 16 Jan 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-381xx</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-381xx</guid>
    </item>
    <item>
      <title>H2 RCE</title>
      <description>
        <![CDATA[This challenge covers how to gain code execution by leveraging an H2 database in a Java application]]>
      </description>
      <pubDate>Wed, 12 Jan 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/h2-rce</link>
      <guid>https://pentesterlab.com/exercises/h2-rce</guid>
    </item>
    <item>
      <title>TypeScript Snippet #04</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in TypeScript]]>
      </description>
      <pubDate>Thu, 06 Jan 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/typescript-04</link>
      <guid>https://pentesterlab.com/exercises/typescript-04</guid>
    </item>
    <item>
      <title>TypeScript Snippet #05</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in TypeScript]]>
      </description>
      <pubDate>Thu, 06 Jan 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/typescript-05</link>
      <guid>https://pentesterlab.com/exercises/typescript-05</guid>
    </item>
    <item>
      <title>TypeScript Snippet #06</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in TypeScript]]>
      </description>
      <pubDate>Thu, 06 Jan 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/typescript-06</link>
      <guid>https://pentesterlab.com/exercises/typescript-06</guid>
    </item>
    <item>
      <title>TypeScript Snippet #07</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in TypeScript]]>
      </description>
      <pubDate>Thu, 06 Jan 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/typescript-07</link>
      <guid>https://pentesterlab.com/exercises/typescript-07</guid>
    </item>
    <item>
      <title>TypeScript Snippet #08</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in TypeScript]]>
      </description>
      <pubDate>Thu, 06 Jan 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/typescript-08</link>
      <guid>https://pentesterlab.com/exercises/typescript-08</guid>
    </item>
    <item>
      <title>TypeScript Snippet #09</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in TypeScript]]>
      </description>
      <pubDate>Thu, 06 Jan 2022 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/typescript-09</link>
      <guid>https://pentesterlab.com/exercises/typescript-09</guid>
    </item>
    <item>
      <title>CVE-2008-4x9x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Tue, 28 Dec 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2008-4x9x</link>
      <guid>https://pentesterlab.com/exercises/cve-2008-4x9x</guid>
    </item>
    <item>
      <title>Log4j RCE II</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn Java Serialisation exploitation]]>
      </description>
      <pubDate>Mon, 13 Dec 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/log4j-rce-ii</link>
      <guid>https://pentesterlab.com/exercises/log4j-rce-ii</guid>
    </item>
    <item>
      <title>Log4j RCE</title>
      <description>
        <![CDATA[This challenge covers the latest RCE in Log4j]]>
      </description>
      <pubDate>Fri, 10 Dec 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/log4j-rce</link>
      <guid>https://pentesterlab.com/exercises/log4j-rce</guid>
    </item>
    <item>
      <title>CVE-2021-4379x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Tue, 07 Dec 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-4379x</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-4379x</guid>
    </item>
    <item>
      <title>API 08</title>
      <description>
        <![CDATA[This exercise covers how one can inspect HTTP responses to identify information leaks.]]>
      </description>
      <pubDate>Tue, 30 Nov 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-08</link>
      <guid>https://pentesterlab.com/exercises/api-08</guid>
    </item>
    <item>
      <title>CVE-2021-4xx50</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Fri, 19 Nov 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-4xx50</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-4xx50</guid>
    </item>
    <item>
      <title>JDBC RCE</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn Java Serialisation exploitation]]>
      </description>
      <pubDate>Thu, 18 Nov 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jdbc-rce</link>
      <guid>https://pentesterlab.com/exercises/jdbc-rce</guid>
    </item>
    <item>
      <title>CVE-2008-1x3x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Mon, 15 Nov 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2008-1x3x</link>
      <guid>https://pentesterlab.com/exercises/cve-2008-1x3x</guid>
    </item>
    <item>
      <title>Golang Snippet #12</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Tue, 02 Nov 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-12</link>
      <guid>https://pentesterlab.com/exercises/golang-12</guid>
    </item>
    <item>
      <title>TypeScript Snippet #01</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in TypeScript]]>
      </description>
      <pubDate>Tue, 02 Nov 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/typescript-01</link>
      <guid>https://pentesterlab.com/exercises/typescript-01</guid>
    </item>
    <item>
      <title>TypeScript Snippet #02</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in TypeScript]]>
      </description>
      <pubDate>Tue, 02 Nov 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/typescript-02</link>
      <guid>https://pentesterlab.com/exercises/typescript-02</guid>
    </item>
    <item>
      <title>TypeScript Snippet #03</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in TypeScript]]>
      </description>
      <pubDate>Tue, 02 Nov 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/typescript-03</link>
      <guid>https://pentesterlab.com/exercises/typescript-03</guid>
    </item>
    <item>
      <title>API 07</title>
      <description>
        <![CDATA[This exercise covers how one can inspect JavaScript code to identify information leak.]]>
      </description>
      <pubDate>Wed, 20 Oct 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-07</link>
      <guid>https://pentesterlab.com/exercises/api-07</guid>
    </item>
    <item>
      <title>CVE-2021-40438</title>
      <description>
        <![CDATA[This challenge covers how to trigger a Server-Side Request Forgery by leveraging CVE-2021-40438]]>
      </description>
      <pubDate>Mon, 18 Oct 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-40438</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-40438</guid>
    </item>
    <item>
      <title>CVE-2021-41773</title>
      <description>
        <![CDATA[This challenge covers how to read arbitrary files by leveraging CVE-2021-41773]]>
      </description>
      <pubDate>Wed, 06 Oct 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-41773</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-41773</guid>
    </item>
    <item>
      <title>CVE-2021-41773 II</title>
      <description>
        <![CDATA[This challenge covers how to gain code execution by leveraging CVE-2021-41773]]>
      </description>
      <pubDate>Wed, 06 Oct 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-41773-ii</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-41773-ii</guid>
    </item>
    <item>
      <title>HTTP 36</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Mon, 20 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-36</link>
      <guid>https://pentesterlab.com/exercises/http-36</guid>
    </item>
    <item>
      <title>HTTP 37</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Mon, 20 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-37</link>
      <guid>https://pentesterlab.com/exercises/http-37</guid>
    </item>
    <item>
      <title>HTTP 38</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Mon, 20 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-38</link>
      <guid>https://pentesterlab.com/exercises/http-38</guid>
    </item>
    <item>
      <title>HTTP 39</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Mon, 20 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-39</link>
      <guid>https://pentesterlab.com/exercises/http-39</guid>
    </item>
    <item>
      <title>HTTP 40</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Mon, 20 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-40</link>
      <guid>https://pentesterlab.com/exercises/http-40</guid>
    </item>
    <item>
      <title>CVE-2006-4xxx</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Mon, 13 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2006-4xxx</link>
      <guid>https://pentesterlab.com/exercises/cve-2006-4xxx</guid>
    </item>
    <item>
      <title>CVE-2006-4xxx_ii</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Mon, 13 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2006-4xxx-ii</link>
      <guid>https://pentesterlab.com/exercises/cve-2006-4xxx-ii</guid>
    </item>
    <item>
      <title>PHP Snippet #04</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in PHP]]>
      </description>
      <pubDate>Thu, 09 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/php-04</link>
      <guid>https://pentesterlab.com/exercises/php-04</guid>
    </item>
    <item>
      <title>PHP Snippet #05</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in PHP]]>
      </description>
      <pubDate>Thu, 09 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/php-05</link>
      <guid>https://pentesterlab.com/exercises/php-05</guid>
    </item>
    <item>
      <title>PHP Snippet #06</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in PHP]]>
      </description>
      <pubDate>Thu, 09 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/php-06</link>
      <guid>https://pentesterlab.com/exercises/php-06</guid>
    </item>
    <item>
      <title>API 06</title>
      <description>
        <![CDATA[This exercise covers how one can inspect JavaScript code to identify unused endpoints.]]>
      </description>
      <pubDate>Mon, 06 Sep 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-06</link>
      <guid>https://pentesterlab.com/exercises/api-06</guid>
    </item>
    <item>
      <title>Java Snippet #01</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Mon, 30 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-01</link>
      <guid>https://pentesterlab.com/exercises/java-01</guid>
    </item>
    <item>
      <title>Java Snippet #02</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Mon, 30 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-02</link>
      <guid>https://pentesterlab.com/exercises/java-02</guid>
    </item>
    <item>
      <title>Java Snippet #03</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Java]]>
      </description>
      <pubDate>Mon, 30 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/java-03</link>
      <guid>https://pentesterlab.com/exercises/java-03</guid>
    </item>
    <item>
      <title>CVE-2021-37xxx</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Sun, 29 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-37xxx</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-37xxx</guid>
    </item>
    <item>
      <title>PHP Snippet #01</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in PHP]]>
      </description>
      <pubDate>Tue, 24 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/php-01</link>
      <guid>https://pentesterlab.com/exercises/php-01</guid>
    </item>
    <item>
      <title>PHP Snippet #02</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in PHP]]>
      </description>
      <pubDate>Tue, 24 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/php-02</link>
      <guid>https://pentesterlab.com/exercises/php-02</guid>
    </item>
    <item>
      <title>PHP Snippet #03</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in PHP]]>
      </description>
      <pubDate>Tue, 24 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/php-03</link>
      <guid>https://pentesterlab.com/exercises/php-03</guid>
    </item>
    <item>
      <title>HTTP 31</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Thu, 12 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-31</link>
      <guid>https://pentesterlab.com/exercises/http-31</guid>
    </item>
    <item>
      <title>HTTP 32</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Thu, 12 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-32</link>
      <guid>https://pentesterlab.com/exercises/http-32</guid>
    </item>
    <item>
      <title>HTTP 35</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Thu, 12 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-35</link>
      <guid>https://pentesterlab.com/exercises/http-35</guid>
    </item>
    <item>
      <title>HTTP 34</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Thu, 12 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-34</link>
      <guid>https://pentesterlab.com/exercises/http-34</guid>
    </item>
    <item>
      <title>HTTP 33</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Thu, 12 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-33</link>
      <guid>https://pentesterlab.com/exercises/http-33</guid>
    </item>
    <item>
      <title>API 05</title>
      <description>
        <![CDATA[This exercise covers how one can inspect JavaScript code to identify unused endpoints.]]>
      </description>
      <pubDate>Mon, 09 Aug 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-05</link>
      <guid>https://pentesterlab.com/exercises/api-05</guid>
    </item>
    <item>
      <title>API 04</title>
      <description>
        <![CDATA[This exercise covers how one can inspect JavaScript code to identify unused endpoints.]]>
      </description>
      <pubDate>Tue, 27 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-04</link>
      <guid>https://pentesterlab.com/exercises/api-04</guid>
    </item>
    <item>
      <title>Golang Snippet #02</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-02</link>
      <guid>https://pentesterlab.com/exercises/golang-02</guid>
    </item>
    <item>
      <title>Golang Snippet #03</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-03</link>
      <guid>https://pentesterlab.com/exercises/golang-03</guid>
    </item>
    <item>
      <title>Golang Snippet #04</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-04</link>
      <guid>https://pentesterlab.com/exercises/golang-04</guid>
    </item>
    <item>
      <title>Golang Snippet #05</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-05</link>
      <guid>https://pentesterlab.com/exercises/golang-05</guid>
    </item>
    <item>
      <title>Golang Snippet #06</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-06</link>
      <guid>https://pentesterlab.com/exercises/golang-06</guid>
    </item>
    <item>
      <title>Golang Snippet #07</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-07</link>
      <guid>https://pentesterlab.com/exercises/golang-07</guid>
    </item>
    <item>
      <title>Golang Snippet #08</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-08</link>
      <guid>https://pentesterlab.com/exercises/golang-08</guid>
    </item>
    <item>
      <title>Golang Snippet #09</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-09</link>
      <guid>https://pentesterlab.com/exercises/golang-09</guid>
    </item>
    <item>
      <title>Golang Snippet #10</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-10</link>
      <guid>https://pentesterlab.com/exercises/golang-10</guid>
    </item>
    <item>
      <title>Golang Snippet #11</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Golang]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/golang-11</link>
      <guid>https://pentesterlab.com/exercises/golang-11</guid>
    </item>
    <item>
      <title>Javascript Snippet #01</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in JavaScript]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/javascript-01</link>
      <guid>https://pentesterlab.com/exercises/javascript-01</guid>
    </item>
    <item>
      <title>Javascript Snippet #02</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in JavaScript]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/javascript-02</link>
      <guid>https://pentesterlab.com/exercises/javascript-02</guid>
    </item>
    <item>
      <title>Javascript Snippet #03</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in JavaScript]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/javascript-03</link>
      <guid>https://pentesterlab.com/exercises/javascript-03</guid>
    </item>
    <item>
      <title>Javascript Snippet #04</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in JavaScript]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/javascript-04</link>
      <guid>https://pentesterlab.com/exercises/javascript-04</guid>
    </item>
    <item>
      <title>Javascript Snippet #05</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in JavaScript]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/javascript-05</link>
      <guid>https://pentesterlab.com/exercises/javascript-05</guid>
    </item>
    <item>
      <title>Javascript Snippet #06</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in JavaScript]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/javascript-06</link>
      <guid>https://pentesterlab.com/exercises/javascript-06</guid>
    </item>
    <item>
      <title>Javascript Snippet #07</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in JavaScript]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/javascript-07</link>
      <guid>https://pentesterlab.com/exercises/javascript-07</guid>
    </item>
    <item>
      <title>Python Snippet #01</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Python]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/python-01</link>
      <guid>https://pentesterlab.com/exercises/python-01</guid>
    </item>
    <item>
      <title>Ruby Snippet #01</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Ruby]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ruby-01</link>
      <guid>https://pentesterlab.com/exercises/ruby-01</guid>
    </item>
    <item>
      <title>Ruby Snippet #02</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Ruby]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ruby-02</link>
      <guid>https://pentesterlab.com/exercises/ruby-02</guid>
    </item>
    <item>
      <title>Ruby Snippet #03</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Ruby]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ruby-03</link>
      <guid>https://pentesterlab.com/exercises/ruby-03</guid>
    </item>
    <item>
      <title>Ruby Snippet #04</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Ruby]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ruby-04</link>
      <guid>https://pentesterlab.com/exercises/ruby-04</guid>
    </item>
    <item>
      <title>Ruby Snippet #05</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Ruby]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ruby-05</link>
      <guid>https://pentesterlab.com/exercises/ruby-05</guid>
    </item>
    <item>
      <title>Ruby Snippet #06</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Ruby]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ruby-06</link>
      <guid>https://pentesterlab.com/exercises/ruby-06</guid>
    </item>
    <item>
      <title>Ruby Snippet #07</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Ruby]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ruby-07</link>
      <guid>https://pentesterlab.com/exercises/ruby-07</guid>
    </item>
    <item>
      <title>Ruby Snippet #08</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Ruby]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ruby-08</link>
      <guid>https://pentesterlab.com/exercises/ruby-08</guid>
    </item>
    <item>
      <title>Ruby Snippet #09</title>
      <description>
        <![CDATA[This challenge covers the review of a snippet of code written in Ruby]]>
      </description>
      <pubDate>Wed, 21 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ruby-09</link>
      <guid>https://pentesterlab.com/exercises/ruby-09</guid>
    </item>
    <item>
      <title>HTTP 26</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Tue, 13 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-26</link>
      <guid>https://pentesterlab.com/exercises/http-26</guid>
    </item>
    <item>
      <title>HTTP 27</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Tue, 13 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-27</link>
      <guid>https://pentesterlab.com/exercises/http-27</guid>
    </item>
    <item>
      <title>HTTP 28</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Tue, 13 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-28</link>
      <guid>https://pentesterlab.com/exercises/http-28</guid>
    </item>
    <item>
      <title>HTTP 29</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Tue, 13 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-29</link>
      <guid>https://pentesterlab.com/exercises/http-29</guid>
    </item>
    <item>
      <title>HTTP 30</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Tue, 13 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-30</link>
      <guid>https://pentesterlab.com/exercises/http-30</guid>
    </item>
    <item>
      <title>CVE-2020-17xx7</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Wed, 07 Jul 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2020-17xx7</link>
      <guid>https://pentesterlab.com/exercises/cve-2020-17xx7</guid>
    </item>
    <item>
      <title>Ox Remote Code Execution</title>
      <description>
        <![CDATA[This exercise covers how you can gain code execution when an application is using Ox to deserialize data and is running on Ruby 2.3]]>
      </description>
      <pubDate>Thu, 24 Jun 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ox-rce</link>
      <guid>https://pentesterlab.com/exercises/ox-rce</guid>
    </item>
    <item>
      <title>CVE-2020-9x9x</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Tue, 22 Jun 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2020-9x9x</link>
      <guid>https://pentesterlab.com/exercises/cve-2020-9x9x</guid>
    </item>
    <item>
      <title>HTTP 21</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Sun, 13 Jun 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-21</link>
      <guid>https://pentesterlab.com/exercises/http-21</guid>
    </item>
    <item>
      <title>HTTP 22</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Sun, 13 Jun 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-22</link>
      <guid>https://pentesterlab.com/exercises/http-22</guid>
    </item>
    <item>
      <title>HTTP 23</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Sun, 13 Jun 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-23</link>
      <guid>https://pentesterlab.com/exercises/http-23</guid>
    </item>
    <item>
      <title>HTTP 24</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Sun, 13 Jun 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-24</link>
      <guid>https://pentesterlab.com/exercises/http-24</guid>
    </item>
    <item>
      <title>HTTP 25</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Sun, 13 Jun 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-25</link>
      <guid>https://pentesterlab.com/exercises/http-25</guid>
    </item>
    <item>
      <title>HTTP 16</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Thu, 27 May 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-16</link>
      <guid>https://pentesterlab.com/exercises/http-16</guid>
    </item>
    <item>
      <title>HTTP 20</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Thu, 27 May 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-20</link>
      <guid>https://pentesterlab.com/exercises/http-20</guid>
    </item>
    <item>
      <title>HTTP 18</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Thu, 27 May 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-18</link>
      <guid>https://pentesterlab.com/exercises/http-18</guid>
    </item>
    <item>
      <title>HTTP 19</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Thu, 27 May 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-19</link>
      <guid>https://pentesterlab.com/exercises/http-19</guid>
    </item>
    <item>
      <title>HTTP 17</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Thu, 27 May 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-17</link>
      <guid>https://pentesterlab.com/exercises/http-17</guid>
    </item>
    <item>
      <title>CVE-2020-17xx8</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Wed, 19 May 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2020-17xx8</link>
      <guid>https://pentesterlab.com/exercises/cve-2020-17xx8</guid>
    </item>
    <item>
      <title>CVE-2021-22204: Exiftool RCE</title>
      <description>
        <![CDATA[This exercise covers how you can gain code execution when an application uses exiftool on user-controlled files]]>
      </description>
      <pubDate>Sun, 16 May 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2021-22204</link>
      <guid>https://pentesterlab.com/exercises/cve-2021-22204</guid>
    </item>
    <item>
      <title>SSRF via FFMPEG II</title>
      <description>
        <![CDATA[This exercise covers how you can read arbitrary files when an application uses ffmpeg to render videos from a video you provide]]>
      </description>
      <pubDate>Thu, 06 May 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ffmpeg-ssrf-ii</link>
      <guid>https://pentesterlab.com/exercises/ffmpeg-ssrf-ii</guid>
    </item>
    <item>
      <title>API 03</title>
      <description>
        <![CDATA[This exercise is the API version of an exercise you already solved in another badge. You should use it to get more confident with discovering vulnerabilities without any hint on what to look for.]]>
      </description>
      <pubDate>Fri, 30 Apr 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-03</link>
      <guid>https://pentesterlab.com/exercises/api-03</guid>
    </item>
    <item>
      <title>CVE-2020-11xxx</title>
      <description>
        <![CDATA[This challenge covers the review of a CVE and its patch]]>
      </description>
      <pubDate>Fri, 30 Apr 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2020-11xxx</link>
      <guid>https://pentesterlab.com/exercises/cve-2020-11xxx</guid>
    </item>
    <item>
      <title>OAuth2: Authorization Server XSS II</title>
      <description>
        <![CDATA[This exercise covers the exploitation of an XSS in an OAuth2 Authorization Server]]>
      </description>
      <pubDate>Wed, 21 Apr 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-xss-auth-ii</link>
      <guid>https://pentesterlab.com/exercises/oauth2-xss-auth-ii</guid>
    </item>
    <item>
      <title>HTTP 11</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Fri, 09 Apr 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-11</link>
      <guid>https://pentesterlab.com/exercises/http-11</guid>
    </item>
    <item>
      <title>HTTP 15</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Fri, 09 Apr 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-15</link>
      <guid>https://pentesterlab.com/exercises/http-15</guid>
    </item>
    <item>
      <title>HTTP 12</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Fri, 09 Apr 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-12</link>
      <guid>https://pentesterlab.com/exercises/http-12</guid>
    </item>
    <item>
      <title>HTTP 13</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Fri, 09 Apr 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-13</link>
      <guid>https://pentesterlab.com/exercises/http-13</guid>
    </item>
    <item>
      <title>HTTP 14</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Fri, 09 Apr 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-14</link>
      <guid>https://pentesterlab.com/exercises/http-14</guid>
    </item>
    <item>
      <title>API 02</title>
      <description>
        <![CDATA[This exercise is the API version of an exercise you already solved in another badge. You should use it to get more confident with discovering vulnerabilities without any hint on what to look for.]]>
      </description>
      <pubDate>Mon, 29 Mar 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-02</link>
      <guid>https://pentesterlab.com/exercises/api-02</guid>
    </item>
    <item>
      <title>Express Local File Read</title>
      <description>
        <![CDATA[This exercise covers how an insecure call to render can be used to gain local files read with Express]]>
      </description>
      <pubDate>Fri, 26 Mar 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/express-lfr</link>
      <guid>https://pentesterlab.com/exercises/express-lfr</guid>
    </item>
    <item>
      <title>OAuth2: Authorization Server XSS</title>
      <description>
        <![CDATA[This exercise covers the exploitation of an XSS in an OAuth2 Authorization Server]]>
      </description>
      <pubDate>Fri, 19 Mar 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-xss-auth</link>
      <guid>https://pentesterlab.com/exercises/oauth2-xss-auth</guid>
    </item>
    <item>
      <title>HTTP 10</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Fri, 12 Mar 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-10</link>
      <guid>https://pentesterlab.com/exercises/http-10</guid>
    </item>
    <item>
      <title>HTTP 09</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Fri, 12 Mar 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-09</link>
      <guid>https://pentesterlab.com/exercises/http-09</guid>
    </item>
    <item>
      <title>HTTP 07</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Fri, 12 Mar 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-07</link>
      <guid>https://pentesterlab.com/exercises/http-07</guid>
    </item>
    <item>
      <title>HTTP 06</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Fri, 12 Mar 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-06</link>
      <guid>https://pentesterlab.com/exercises/http-06</guid>
    </item>
    <item>
      <title>HTTP 08</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Fri, 12 Mar 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-08</link>
      <guid>https://pentesterlab.com/exercises/http-08</guid>
    </item>
    <item>
      <title>HTTP 03</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Sun, 28 Feb 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-03</link>
      <guid>https://pentesterlab.com/exercises/http-03</guid>
    </item>
    <item>
      <title>HTTP 04</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Sun, 28 Feb 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-04</link>
      <guid>https://pentesterlab.com/exercises/http-04</guid>
    </item>
    <item>
      <title>HTTP 05</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Sun, 28 Feb 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-05</link>
      <guid>https://pentesterlab.com/exercises/http-05</guid>
    </item>
    <item>
      <title>HTTP 02</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Sun, 28 Feb 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-02</link>
      <guid>https://pentesterlab.com/exercises/http-02</guid>
    </item>
    <item>
      <title>HTTP 01</title>
      <description>
        <![CDATA[This challenge covers how to send specific HTTP requests]]>
      </description>
      <pubDate>Sun, 28 Feb 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/http-01</link>
      <guid>https://pentesterlab.com/exercises/http-01</guid>
    </item>
    <item>
      <title>API 01</title>
      <description>
        <![CDATA[This exercise is the API version of an exercise you already solved in the Essential Badge. You should use it to get more confident with discovering vulnerabilities without any hint on what to look for.]]>
      </description>
      <pubDate>Fri, 19 Feb 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-01</link>
      <guid>https://pentesterlab.com/exercises/api-01</guid>
    </item>
    <item>
      <title>JWT Algorithm Confusion with RSA Public Key Recovery</title>
      <description>
        <![CDATA[This exercise covers the exploitation of algorithm confusion when no public key is available]]>
      </description>
      <pubDate>Wed, 17 Feb 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-algorithm-confusion-rsa-key-recovery</link>
      <guid>https://pentesterlab.com/exercises/jwt-algorithm-confusion-rsa-key-recovery</guid>
    </item>
    <item>
      <title>SAML: Comment Injection II</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a comment injection vulnerability in SAML]]>
      </description>
      <pubDate>Fri, 05 Feb 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml-ix</link>
      <guid>https://pentesterlab.com/exercises/saml-ix</guid>
    </item>
    <item>
      <title>Recon 24</title>
      <description>
        <![CDATA[In this challenge, you need to look for a file named key.txt in the place used to serve the assets for the main website]]>
      </description>
      <pubDate>Sun, 31 Jan 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-24</link>
      <guid>https://pentesterlab.com/exercises/recon-24</guid>
    </item>
    <item>
      <title>Recon 25</title>
      <description>
        <![CDATA[In this challenge, you need to look for a file named key2.txt in the place used to serve the assets for the main website]]>
      </description>
      <pubDate>Sun, 31 Jan 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-25</link>
      <guid>https://pentesterlab.com/exercises/recon-25</guid>
    </item>
    <item>
      <title>Recon 26</title>
      <description>
        <![CDATA[In this challenge, you need to look for a key in the JavaScript used by the website]]>
      </description>
      <pubDate>Sun, 31 Jan 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-26</link>
      <guid>https://pentesterlab.com/exercises/recon-26</guid>
    </item>
    <item>
      <title>SSRF via FFMPEG</title>
      <description>
        <![CDATA[This exercise covers how you can read arbitrary files when an application uses ffmpeg to render videos from a video you provide]]>
      </description>
      <pubDate>Fri, 29 Jan 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ffmpeg-ssrf</link>
      <guid>https://pentesterlab.com/exercises/ffmpeg-ssrf</guid>
    </item>
    <item>
      <title>SAML: Signature Wrapping II</title>
      <description>
        <![CDATA[This exercise covers how to use Signature Wrapping to become an arbitrary user]]>
      </description>
      <pubDate>Sat, 23 Jan 2021 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml-viii</link>
      <guid>https://pentesterlab.com/exercises/saml-viii</guid>
    </item>
    <item>
      <title>RCE via argument injection</title>
      <description>
        <![CDATA[This exercise covers a remote command execution vulnerability via argument injection]]>
      </description>
      <pubDate>Wed, 30 Dec 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/virusfatal</link>
      <guid>https://pentesterlab.com/exercises/virusfatal</guid>
    </item>
    <item>
      <title>Code Review 16</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Wed, 23 Dec 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-16</link>
      <guid>https://pentesterlab.com/exercises/codereview-16</guid>
    </item>
    <item>
      <title>Code Review 17</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Wed, 23 Dec 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-17</link>
      <guid>https://pentesterlab.com/exercises/codereview-17</guid>
    </item>
    <item>
      <title>SAML: Signature Wrapping</title>
      <description>
        <![CDATA[This exercise covers how to use Signature Wrapping to become an arbitrary user]]>
      </description>
      <pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml-vii</link>
      <guid>https://pentesterlab.com/exercises/saml-vii</guid>
    </item>
    <item>
      <title>Recon 20</title>
      <description>
        <![CDATA[In this challenge, you need to look at the branches in repo3]]>
      </description>
      <pubDate>Thu, 03 Dec 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-20</link>
      <guid>https://pentesterlab.com/exercises/recon-20</guid>
    </item>
    <item>
      <title>Recon 21</title>
      <description>
        <![CDATA[In this challenge, you need to look at the information in the branches for repo4]]>
      </description>
      <pubDate>Thu, 03 Dec 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-21</link>
      <guid>https://pentesterlab.com/exercises/recon-21</guid>
    </item>
    <item>
      <title>Recon 22</title>
      <description>
        <![CDATA[In this challenge, you need to look in repo9 for deleted files]]>
      </description>
      <pubDate>Thu, 03 Dec 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-22</link>
      <guid>https://pentesterlab.com/exercises/recon-22</guid>
    </item>
    <item>
      <title>Recon 23</title>
      <description>
        <![CDATA[In this challenge, you need to look for sensitive information in commit messages]]>
      </description>
      <pubDate>Thu, 03 Dec 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-23</link>
      <guid>https://pentesterlab.com/exercises/recon-23</guid>
    </item>
    <item>
      <title>SAML: SAMLResponse forwarding</title>
      <description>
        <![CDATA[This exercise covers how to pass the SAMLResponse from one Service Provider to another]]>
      </description>
      <pubDate>Fri, 27 Nov 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml-vi</link>
      <guid>https://pentesterlab.com/exercises/saml-vi</guid>
    </item>
    <item>
      <title>CGI and Signature</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a vulnerable CGI.]]>
      </description>
      <pubDate>Tue, 24 Nov 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cgi-sign</link>
      <guid>https://pentesterlab.com/exercises/cgi-sign</guid>
    </item>
    <item>
      <title>Recon 17</title>
      <description>
        <![CDATA[In this challenge, you need to look at the name of the developer used in the repository test1]]>
      </description>
      <pubDate>Wed, 18 Nov 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-17</link>
      <guid>https://pentesterlab.com/exercises/recon-17</guid>
    </item>
    <item>
      <title>Recon 18</title>
      <description>
        <![CDATA[In this challenge, you need to look at the public repository of the developers in the organisation]]>
      </description>
      <pubDate>Wed, 18 Nov 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-18</link>
      <guid>https://pentesterlab.com/exercises/recon-18</guid>
    </item>
    <item>
      <title>Recon 19</title>
      <description>
        <![CDATA[In this challenge, you need to look at the email addresses used for commits in the repository repo7]]>
      </description>
      <pubDate>Wed, 18 Nov 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-19</link>
      <guid>https://pentesterlab.com/exercises/recon-19</guid>
    </item>
    <item>
      <title>Code Review 15</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Sun, 15 Nov 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-15</link>
      <guid>https://pentesterlab.com/exercises/codereview-15</guid>
    </item>
    <item>
      <title>Code Review 14</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Fri, 13 Nov 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-14</link>
      <guid>https://pentesterlab.com/exercises/codereview-14</guid>
    </item>
    <item>
      <title>CVE-2020-14343: PyYAML unsafe loader</title>
      <description>
        <![CDATA[This exercise covers how you can gain code execution when an application use a vulnerable version of PyYAML and relies on load()]]>
      </description>
      <pubDate>Fri, 23 Oct 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2020-14343</link>
      <guid>https://pentesterlab.com/exercises/cve-2020-14343</guid>
    </item>
    <item>
      <title>OAuth2: State Fixation</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a state fixation in an OAuth2 Client]]>
      </description>
      <pubDate>Fri, 16 Oct 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-state-fixation</link>
      <guid>https://pentesterlab.com/exercises/oauth2-state-fixation</guid>
    </item>
    <item>
      <title>Code Review 13</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Thu, 08 Oct 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-13</link>
      <guid>https://pentesterlab.com/exercises/codereview-13</guid>
    </item>
    <item>
      <title>CVE-2020-7115: Aruba Clearpass RCE</title>
      <description>
        <![CDATA[This exercise covers a remote command execution issue on Aruba Clearpass RCE]]>
      </description>
      <pubDate>Sun, 27 Sep 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2020-7115</link>
      <guid>https://pentesterlab.com/exercises/cve-2020-7115</guid>
    </item>
    <item>
      <title>Code Review 12</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Wed, 23 Sep 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-12</link>
      <guid>https://pentesterlab.com/exercises/codereview-12</guid>
    </item>
    <item>
      <title>OAuth2: Predictable State II</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a predictable state in an OAuth2 Client]]>
      </description>
      <pubDate>Tue, 15 Sep 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-pred-state-ii</link>
      <guid>https://pentesterlab.com/exercises/oauth2-pred-state-ii</guid>
    </item>
    <item>
      <title>Recon 13</title>
      <description>
        <![CDATA[In this challenge, you need to find the TXT record linked to key.z.hackycorp.com]]>
      </description>
      <pubDate>Thu, 03 Sep 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-13</link>
      <guid>https://pentesterlab.com/exercises/recon-13</guid>
    </item>
    <item>
      <title>Recon 14</title>
      <description>
        <![CDATA[In this challenge, you need to find a TXT record by doing a zone transfer on z.hackycorp.com]]>
      </description>
      <pubDate>Thu, 03 Sep 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-14</link>
      <guid>https://pentesterlab.com/exercises/recon-14</guid>
    </item>
    <item>
      <title>Recon 15</title>
      <description>
        <![CDATA[In this challenge, you need to find a TXT record by doing a zone transfer on the internal zone "int"]]>
      </description>
      <pubDate>Thu, 03 Sep 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-15</link>
      <guid>https://pentesterlab.com/exercises/recon-15</guid>
    </item>
    <item>
      <title>Recon 16</title>
      <description>
        <![CDATA[In this challenge, you need to find the version of Bind used]]>
      </description>
      <pubDate>Thu, 03 Sep 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-16</link>
      <guid>https://pentesterlab.com/exercises/recon-16</guid>
    </item>
    <item>
      <title>EDDSA vulnerability in Monocypher</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a vulnerability impacting Monocypher.]]>
      </description>
      <pubDate>Wed, 26 Aug 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/eddsa</link>
      <guid>https://pentesterlab.com/exercises/eddsa</guid>
    </item>
    <item>
      <title>Code Review 11</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Sun, 23 Aug 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-11</link>
      <guid>https://pentesterlab.com/exercises/codereview-11</guid>
    </item>
    <item>
      <title>OAuth2: Predictable State</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a predictable state in an OAuth2 Client]]>
      </description>
      <pubDate>Thu, 13 Aug 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-pred-state</link>
      <guid>https://pentesterlab.com/exercises/oauth2-pred-state</guid>
    </item>
    <item>
      <title>Code Review 10</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Wed, 29 Jul 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-10</link>
      <guid>https://pentesterlab.com/exercises/codereview-10</guid>
    </item>
    <item>
      <title>Recon 11</title>
      <description>
        <![CDATA[]]>
      </description>
      <pubDate>Thu, 23 Jul 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-11</link>
      <guid>https://pentesterlab.com/exercises/recon-11</guid>
    </item>
    <item>
      <title>Recon 12</title>
      <description>
        <![CDATA[]]>
      </description>
      <pubDate>Thu, 23 Jul 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-12</link>
      <guid>https://pentesterlab.com/exercises/recon-12</guid>
    </item>
    <item>
      <title>Unicode and NFKC</title>
      <description>
        <![CDATA[This exercise covers how to leverage unicode to exploit a directory traversal]]>
      </description>
      <pubDate>Fri, 10 Jul 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unicode-transform</link>
      <guid>https://pentesterlab.com/exercises/unicode-transform</guid>
    </item>
    <item>
      <title>SAML: Trusted Embedded Key</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a Service Provider (SP) that doesn't check the certificate provided in the SAMLResponse]]>
      </description>
      <pubDate>Wed, 01 Jul 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml-v</link>
      <guid>https://pentesterlab.com/exercises/saml-v</guid>
    </item>
    <item>
      <title>Recon 06</title>
      <description>
        <![CDATA[This exercise covers default vhost]]>
      </description>
      <pubDate>Thu, 25 Jun 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-06</link>
      <guid>https://pentesterlab.com/exercises/recon-06</guid>
    </item>
    <item>
      <title>Recon 07</title>
      <description>
        <![CDATA[This exercise covers default TLS vhost]]>
      </description>
      <pubDate>Thu, 25 Jun 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-07</link>
      <guid>https://pentesterlab.com/exercises/recon-07</guid>
    </item>
    <item>
      <title>Recon 08</title>
      <description>
        <![CDATA[This exercise covers aliases in TLS certificates]]>
      </description>
      <pubDate>Thu, 25 Jun 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-08</link>
      <guid>https://pentesterlab.com/exercises/recon-08</guid>
    </item>
    <item>
      <title>Recon 09</title>
      <description>
        <![CDATA[]]>
      </description>
      <pubDate>Thu, 25 Jun 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-09</link>
      <guid>https://pentesterlab.com/exercises/recon-09</guid>
    </item>
    <item>
      <title>CVE-2020-8163: Rails local name RCE</title>
      <description>
        <![CDATA[This exercise details the exploitation of CVE-2020-8163 to gain code execution]]>
      </description>
      <pubDate>Thu, 18 Jun 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2020-8163</link>
      <guid>https://pentesterlab.com/exercises/cve-2020-8163</guid>
    </item>
    <item>
      <title>SAML: Known Key</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a known key in SAML]]>
      </description>
      <pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml-iv</link>
      <guid>https://pentesterlab.com/exercises/saml-iv</guid>
    </item>
    <item>
      <title>Code Review 09</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Fri, 05 Jun 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-09</link>
      <guid>https://pentesterlab.com/exercises/codereview-09</guid>
    </item>
    <item>
      <title>Recon 04</title>
      <description>
        <![CDATA[This exercise covers common interesting directories]]>
      </description>
      <pubDate>Tue, 02 Jun 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-04</link>
      <guid>https://pentesterlab.com/exercises/recon-04</guid>
    </item>
    <item>
      <title>Recon 05</title>
      <description>
        <![CDATA[This exercise covers simple directory bruteforcing]]>
      </description>
      <pubDate>Tue, 02 Jun 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-05</link>
      <guid>https://pentesterlab.com/exercises/recon-05</guid>
    </item>
    <item>
      <title>Recon 01</title>
      <description>
        <![CDATA[This exercise covers 404 error pages]]>
      </description>
      <pubDate>Mon, 01 Jun 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-01</link>
      <guid>https://pentesterlab.com/exercises/recon-01</guid>
    </item>
    <item>
      <title>OAuth2: Client Server XSS</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a Cross-Site Scripting in an OAuth2 Client and Server]]>
      </description>
      <pubDate>Mon, 25 May 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-xss-client</link>
      <guid>https://pentesterlab.com/exercises/oauth2-xss-client</guid>
    </item>
    <item>
      <title>Zip symlink</title>
      <description>
        <![CDATA[This exercise covers how you can create a malicious Zip file and use it to gain access to sensitive files.]]>
      </description>
      <pubDate>Thu, 14 May 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/zip-symlink</link>
      <guid>https://pentesterlab.com/exercises/zip-symlink</guid>
    </item>
    <item>
      <title>Code Review 08</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Thu, 07 May 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-08</link>
      <guid>https://pentesterlab.com/exercises/codereview-08</guid>
    </item>
    <item>
      <title>SAML: Comment Injection</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a comment injection vulnerability in SAML]]>
      </description>
      <pubDate>Tue, 21 Apr 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml-iii</link>
      <guid>https://pentesterlab.com/exercises/saml-iii</guid>
    </item>
    <item>
      <title>Unicode and Downcase</title>
      <description>
        <![CDATA[This exercise covers how you can use unicode to gain access to an admin account.]]>
      </description>
      <pubDate>Tue, 07 Apr 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unicode-down</link>
      <guid>https://pentesterlab.com/exercises/unicode-down</guid>
    </item>
    <item>
      <title>Code Review 07</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Fri, 03 Apr 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-07</link>
      <guid>https://pentesterlab.com/exercises/codereview-07</guid>
    </item>
    <item>
      <title>Recon 10</title>
      <description>
        <![CDATA[This exercise covers visual content discovery]]>
      </description>
      <pubDate>Wed, 01 Apr 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-10</link>
      <guid>https://pentesterlab.com/exercises/recon-10</guid>
    </item>
    <item>
      <title>Recon 00</title>
      <description>
        <![CDATA[This exercise covers the robots.txt file]]>
      </description>
      <pubDate>Tue, 31 Mar 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-00</link>
      <guid>https://pentesterlab.com/exercises/recon-00</guid>
    </item>
    <item>
      <title>Recon 02</title>
      <description>
        <![CDATA[This exercise covers the security.txt file]]>
      </description>
      <pubDate>Tue, 31 Mar 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-02</link>
      <guid>https://pentesterlab.com/exercises/recon-02</guid>
    </item>
    <item>
      <title>Recon 03</title>
      <description>
        <![CDATA[This exercise covers directory listing]]>
      </description>
      <pubDate>Tue, 31 Mar 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/recon-03</link>
      <guid>https://pentesterlab.com/exercises/recon-03</guid>
    </item>
    <item>
      <title>Java Serialize 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn Java Serialisation exploitation]]>
      </description>
      <pubDate>Wed, 25 Mar 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jserialize-01</link>
      <guid>https://pentesterlab.com/exercises/jserialize-01</guid>
    </item>
    <item>
      <title>Unicode and Uppercase</title>
      <description>
        <![CDATA[This exercise covers how you can use unicode to gain access to an admin account.]]>
      </description>
      <pubDate>Fri, 20 Mar 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unicode-up</link>
      <guid>https://pentesterlab.com/exercises/unicode-up</guid>
    </item>
    <item>
      <title>Code Review 06</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Tue, 03 Mar 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-06</link>
      <guid>https://pentesterlab.com/exercises/codereview-06</guid>
    </item>
    <item>
      <title>Cross-Site Leak</title>
      <description>
        <![CDATA[This exercise covers how to use Cross-Site Leak to recover sensitive information]]>
      </description>
      <pubDate>Tue, 18 Feb 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xsleak</link>
      <guid>https://pentesterlab.com/exercises/xsleak</guid>
    </item>
    <item>
      <title>From SQL injection to Shell III: PostgreSQL Edition</title>
      <description>
        <![CDATA[This exercise covers how to gain access to an administration interface using a SQL injection, and  how to get command execution using Ghostscript]]>
      </description>
      <pubDate>Sun, 16 Feb 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/from-sqli-to-shell-iii-pg-edition</link>
      <guid>https://pentesterlab.com/exercises/from-sqli-to-shell-iii-pg-edition</guid>
    </item>
    <item>
      <title>OAuth2: Client  CSRF II</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a CSRF in an OAuth2 Client]]>
      </description>
      <pubDate>Tue, 04 Feb 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-csrf-client-ii</link>
      <guid>https://pentesterlab.com/exercises/oauth2-csrf-client-ii</guid>
    </item>
    <item>
      <title>XSS Include</title>
      <description>
        <![CDATA[This exercise covers how to use Cross-Site-Scripting Include to leak information]]>
      </description>
      <pubDate>Tue, 28 Jan 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xssi</link>
      <guid>https://pentesterlab.com/exercises/xssi</guid>
    </item>
    <item>
      <title>OAuth2: Client  CSRF</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a CSRF in an OAuth2 Client]]>
      </description>
      <pubDate>Fri, 17 Jan 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-csrf-client</link>
      <guid>https://pentesterlab.com/exercises/oauth2-csrf-client</guid>
    </item>
    <item>
      <title>Code Review 05</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Wed, 01 Jan 2020 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-05</link>
      <guid>https://pentesterlab.com/exercises/codereview-05</guid>
    </item>
    <item>
      <title>Code Review 04</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Wed, 25 Dec 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-04</link>
      <guid>https://pentesterlab.com/exercises/codereview-04</guid>
    </item>
    <item>
      <title>JS Prototype Pollution</title>
      <description>
        <![CDATA[This exercise covers how to exploit Prototype Pollution against a JavaScript application]]>
      </description>
      <pubDate>Thu, 19 Dec 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/prototype-pollution</link>
      <guid>https://pentesterlab.com/exercises/prototype-pollution</guid>
    </item>
    <item>
      <title>OAuth2: Authorization Server CSRF</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a CSRF in an OAuth2 Authorization Server]]>
      </description>
      <pubDate>Tue, 03 Dec 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-csrf-auth</link>
      <guid>https://pentesterlab.com/exercises/oauth2-csrf-auth</guid>
    </item>
    <item>
      <title>Code Review 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Mon, 25 Nov 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-03</link>
      <guid>https://pentesterlab.com/exercises/codereview-03</guid>
    </item>
    <item>
      <title>SSRF in PDF generation</title>
      <description>
        <![CDATA[This exercise covers how you can read arbitrary files when an application generates pdfs from provided links]]>
      </description>
      <pubDate>Tue, 19 Nov 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pdf-ssrf</link>
      <guid>https://pentesterlab.com/exercises/pdf-ssrf</guid>
    </item>
    <item>
      <title>OAuth2: Github HTTP HEAD</title>
      <description>
        <![CDATA[This exercise covers the exploitation of the HTTP HEAD issue impacting Github in 2019]]>
      </description>
      <pubDate>Mon, 11 Nov 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-github</link>
      <guid>https://pentesterlab.com/exercises/oauth2-github</guid>
    </item>
    <item>
      <title>SVG XSS</title>
      <description>
        <![CDATA[This exercise covers how to use an SVG to trigger a Cross-Site-Scripting]]>
      </description>
      <pubDate>Tue, 29 Oct 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/svg-xss</link>
      <guid>https://pentesterlab.com/exercises/svg-xss</guid>
    </item>
    <item>
      <title>Apache Pluto RCE</title>
      <description>
        <![CDATA[This exercise covers how to gain code execution on Apache Pluto 3.0.0 due to a flaw in the authorization logic]]>
      </description>
      <pubDate>Fri, 25 Oct 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2018-1306</link>
      <guid>https://pentesterlab.com/exercises/cve-2018-1306</guid>
    </item>
    <item>
      <title>JSON Cross-Site Request Forgery</title>
      <description>
        <![CDATA[This exercise details the exploitation of a Cross-Site Request Forgery when JSON is used]]>
      </description>
      <pubDate>Sun, 06 Oct 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/json-csrf</link>
      <guid>https://pentesterlab.com/exercises/json-csrf</guid>
    </item>
    <item>
      <title>Cross-Site Request Forgery</title>
      <description>
        <![CDATA[This exercise details the exploitation of a Cross-Site Request Forgery to gain access to sensitive data]]>
      </description>
      <pubDate>Thu, 26 Sep 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/csrf</link>
      <guid>https://pentesterlab.com/exercises/csrf</guid>
    </item>
    <item>
      <title>Code Review 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Mon, 16 Sep 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-02</link>
      <guid>https://pentesterlab.com/exercises/codereview-02</guid>
    </item>
    <item>
      <title>postMessage() IV</title>
      <description>
        <![CDATA[This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information when a listener does not filter the Origin and X-Frame-Options is used]]>
      </description>
      <pubDate>Mon, 09 Sep 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/postmessage-iv</link>
      <guid>https://pentesterlab.com/exercises/postmessage-iv</guid>
    </item>
    <item>
      <title>Code Review 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to review real source code]]>
      </description>
      <pubDate>Mon, 26 Aug 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview-01</link>
      <guid>https://pentesterlab.com/exercises/codereview-01</guid>
    </item>
    <item>
      <title>Spring Actuators</title>
      <description>
        <![CDATA[This exercise covers how you can gain code execution using Spring Actuators when Spring Cloud is used.]]>
      </description>
      <pubDate>Mon, 12 Aug 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/spring-actuators</link>
      <guid>https://pentesterlab.com/exercises/spring-actuators</guid>
    </item>
    <item>
      <title>postMessage() III</title>
      <description>
        <![CDATA[This exercise covers how insecure calls to the JavaScript function postMessage() can be used to trigger a Cross-Site Scripting]]>
      </description>
      <pubDate>Tue, 06 Aug 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/postmessage-iii</link>
      <guid>https://pentesterlab.com/exercises/postmessage-iii</guid>
    </item>
    <item>
      <title>postMessage() II</title>
      <description>
        <![CDATA[This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information when a listener does not filter the Origin]]>
      </description>
      <pubDate>Wed, 31 Jul 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/postmessage-ii</link>
      <guid>https://pentesterlab.com/exercises/postmessage-ii</guid>
    </item>
    <item>
      <title>PHP phar://</title>
      <description>
        <![CDATA[This exercise covers how the PHP phar:// handler can be used to gain code execution using PHP unserialize.]]>
      </description>
      <pubDate>Sat, 27 Jul 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/phar</link>
      <guid>https://pentesterlab.com/exercises/phar</guid>
    </item>
    <item>
      <title>Signing Oracle</title>
      <description>
        <![CDATA[This exercise covers how a signing oracle can be used to bypass authorization in place]]>
      </description>
      <pubDate>Tue, 09 Jul 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/signing-oracle</link>
      <guid>https://pentesterlab.com/exercises/signing-oracle</guid>
    </item>
    <item>
      <title>Length Extension Attack</title>
      <description>
        <![CDATA[This exercise covers how to use a length extension attack to exploit a directory traversal vulnerability]]>
      </description>
      <pubDate>Thu, 27 Jun 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/length-extension</link>
      <guid>https://pentesterlab.com/exercises/length-extension</guid>
    </item>
    <item>
      <title>JSON Web Encryption</title>
      <description>
        <![CDATA[This exercise covers how you can create your own JWE if you have access to the public key used by the server]]>
      </description>
      <pubDate>Fri, 21 Jun 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwe</link>
      <guid>https://pentesterlab.com/exercises/jwe</guid>
    </item>
    <item>
      <title>postMessage()</title>
      <description>
        <![CDATA[This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information]]>
      </description>
      <pubDate>Fri, 07 Jun 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/postmessage</link>
      <guid>https://pentesterlab.com/exercises/postmessage</guid>
    </item>
    <item>
      <title>CVE-2019-5418</title>
      <description>
        <![CDATA[This exercise details the exploitation of CVE-2019-5418 to get code execution]]>
      </description>
      <pubDate>Tue, 28 May 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2019-5418</link>
      <guid>https://pentesterlab.com/exercises/cve-2019-5418</guid>
    </item>
    <item>
      <title>Cross-Site WebSocket Hijacking</title>
      <description>
        <![CDATA[This exercise covers Cross-Site WebSocket Hijacking and how it can be used to gain access to sensitive information]]>
      </description>
      <pubDate>Wed, 22 May 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cswsh</link>
      <guid>https://pentesterlab.com/exercises/cswsh</guid>
    </item>
    <item>
      <title>JWT XII</title>
      <description>
        <![CDATA[This exercise covers how to use the x5u header to bypass an authentication based on JWT.]]>
      </description>
      <pubDate>Thu, 02 May 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-xii</link>
      <guid>https://pentesterlab.com/exercises/jwt-xii</guid>
    </item>
    <item>
      <title>Cross-Origin Resource Sharing II</title>
      <description>
        <![CDATA[This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.]]>
      </description>
      <pubDate>Tue, 30 Apr 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cors-ii</link>
      <guid>https://pentesterlab.com/exercises/cors-ii</guid>
    </item>
    <item>
      <title>JWT XI</title>
      <description>
        <![CDATA[This exercise covers how to use the jku header to bypass an authentication based on JWT.]]>
      </description>
      <pubDate>Wed, 10 Apr 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-xi</link>
      <guid>https://pentesterlab.com/exercises/jwt-xi</guid>
    </item>
    <item>
      <title>cve-2019-5420 II</title>
      <description>
        <![CDATA[This exercise details the exploitation of CVE-2019-5420 to gain code execution]]>
      </description>
      <pubDate>Tue, 02 Apr 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2019-5420-ii</link>
      <guid>https://pentesterlab.com/exercises/cve-2019-5420-ii</guid>
    </item>
    <item>
      <title>OAuth2: Client OpenRedirect</title>
      <description>
        <![CDATA[This exercise covers the exploitation of an OpenRedirect in an OAuth2 Client]]>
      </description>
      <pubDate>Fri, 29 Mar 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2-ii</link>
      <guid>https://pentesterlab.com/exercises/oauth2-ii</guid>
    </item>
    <item>
      <title>CVE-2019-5420</title>
      <description>
        <![CDATA[This exercise details the exploitation of CVE-2019-5420 to forge a session as another user]]>
      </description>
      <pubDate>Thu, 21 Mar 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2019-5420</link>
      <guid>https://pentesterlab.com/exercises/cve-2019-5420</guid>
    </item>
    <item>
      <title>JWT X</title>
      <description>
        <![CDATA[This exercise covers how to use the jku header to bypass an authentication based on JWT.]]>
      </description>
      <pubDate>Thu, 07 Mar 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-x</link>
      <guid>https://pentesterlab.com/exercises/jwt-x</guid>
    </item>
    <item>
      <title>GraphQL: SQL Injection</title>
      <description>
        <![CDATA[This exercise covers how to use introspection and a SQL injection to get access to additional information in GraphQL.]]>
      </description>
      <pubDate>Tue, 26 Feb 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/graphql-ii</link>
      <guid>https://pentesterlab.com/exercises/graphql-ii</guid>
    </item>
    <item>
      <title>OAuth2: Authorization Server OpenRedirect</title>
      <description>
        <![CDATA[This exercise covers the exploitation of an OpenRedirect in an OAuth2 Authorization Server]]>
      </description>
      <pubDate>Wed, 13 Feb 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/oauth2</link>
      <guid>https://pentesterlab.com/exercises/oauth2</guid>
    </item>
    <item>
      <title>JWT IX</title>
      <description>
        <![CDATA[This exercise covers how to use the jku header to bypass an authentication based on JWT.]]>
      </description>
      <pubDate>Fri, 08 Feb 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-ix</link>
      <guid>https://pentesterlab.com/exercises/jwt-ix</guid>
    </item>
    <item>
      <title>Gogs RCE II</title>
      <description>
        <![CDATA[This exercise covers how to get code execution against the Git self hosted tool: Gogs.]]>
      </description>
      <pubDate>Thu, 31 Jan 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2018-20303</link>
      <guid>https://pentesterlab.com/exercises/cve-2018-20303</guid>
    </item>
    <item>
      <title>JWT VIII</title>
      <description>
        <![CDATA[This exercise covers how to use the jku header to bypass an authentication based on JWT.]]>
      </description>
      <pubDate>Wed, 16 Jan 2019 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-viii</link>
      <guid>https://pentesterlab.com/exercises/jwt-viii</guid>
    </item>
    <item>
      <title>SAML: Signature Stripping</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a signature stripping vulnerability in SAML]]>
      </description>
      <pubDate>Fri, 28 Dec 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml-ii</link>
      <guid>https://pentesterlab.com/exercises/saml-ii</guid>
    </item>
    <item>
      <title>GraphQL Introspection</title>
      <description>
        <![CDATA[This exercise covers how to use introspection to get access to additional information in GraphQL.]]>
      </description>
      <pubDate>Thu, 13 Dec 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/graphql</link>
      <guid>https://pentesterlab.com/exercises/graphql</guid>
    </item>
    <item>
      <title>Gogs RCE</title>
      <description>
        <![CDATA[This exercise covers how to get code execution against the Git self hosted tool: Gogs.]]>
      </description>
      <pubDate>Thu, 06 Dec 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2018-18925</link>
      <guid>https://pentesterlab.com/exercises/cve-2018-18925</guid>
    </item>
    <item>
      <title>Android 07</title>
      <description>
        <![CDATA[This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data]]>
      </description>
      <pubDate>Thu, 29 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/android-07</link>
      <guid>https://pentesterlab.com/exercises/android-07</guid>
    </item>
    <item>
      <title>Android 06</title>
      <description>
        <![CDATA[This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data]]>
      </description>
      <pubDate>Wed, 28 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/android-06</link>
      <guid>https://pentesterlab.com/exercises/android-06</guid>
    </item>
    <item>
      <title>Android 08</title>
      <description>
        <![CDATA[This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data]]>
      </description>
      <pubDate>Wed, 28 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/android-08</link>
      <guid>https://pentesterlab.com/exercises/android-08</guid>
    </item>
    <item>
      <title>Android 05</title>
      <description>
        <![CDATA[This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data]]>
      </description>
      <pubDate>Thu, 22 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/android-05</link>
      <guid>https://pentesterlab.com/exercises/android-05</guid>
    </item>
    <item>
      <title>PCAP 26</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Mon, 19 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-26</link>
      <guid>https://pentesterlab.com/exercises/pcap-26</guid>
    </item>
    <item>
      <title>PCAP 27</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Mon, 19 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-27</link>
      <guid>https://pentesterlab.com/exercises/pcap-27</guid>
    </item>
    <item>
      <title>PCAP 28</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Mon, 19 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-28</link>
      <guid>https://pentesterlab.com/exercises/pcap-28</guid>
    </item>
    <item>
      <title>PCAP 29</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Mon, 19 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-29</link>
      <guid>https://pentesterlab.com/exercises/pcap-29</guid>
    </item>
    <item>
      <title>PCAP 30</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Mon, 19 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-30</link>
      <guid>https://pentesterlab.com/exercises/pcap-30</guid>
    </item>
    <item>
      <title>PCAP 31</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Mon, 19 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-31</link>
      <guid>https://pentesterlab.com/exercises/pcap-31</guid>
    </item>
    <item>
      <title>PCAP 32</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Mon, 19 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-32</link>
      <guid>https://pentesterlab.com/exercises/pcap-32</guid>
    </item>
    <item>
      <title>PCAP 33</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Mon, 19 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-33</link>
      <guid>https://pentesterlab.com/exercises/pcap-33</guid>
    </item>
    <item>
      <title>PCAP 34</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Mon, 19 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-34</link>
      <guid>https://pentesterlab.com/exercises/pcap-34</guid>
    </item>
    <item>
      <title>PCAP 35</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Mon, 19 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-35</link>
      <guid>https://pentesterlab.com/exercises/pcap-35</guid>
    </item>
    <item>
      <title>Ruby 2.x Universal RCE Deserialization Gadget Chain</title>
      <description>
        <![CDATA[This exercise covers how to get code execution by using a Ruby Universal Gadget when an attacker controls the data passed to Marshal.load()]]>
      </description>
      <pubDate>Wed, 14 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ruby-ugadget</link>
      <guid>https://pentesterlab.com/exercises/ruby-ugadget</guid>
    </item>
    <item>
      <title>CVE-2018-10933: LibSSH auth bypass</title>
      <description>
        <![CDATA[This exercise covers how to bypass authentication on an SSH server based on libssh to gain a shell on the affected system]]>
      </description>
      <pubDate>Thu, 01 Nov 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2018-10933</link>
      <guid>https://pentesterlab.com/exercises/cve-2018-10933</guid>
    </item>
    <item>
      <title>Android 04</title>
      <description>
        <![CDATA[This exercise will guide you through the process of reversing a simple Android code]]>
      </description>
      <pubDate>Mon, 29 Oct 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/android-04</link>
      <guid>https://pentesterlab.com/exercises/android-04</guid>
    </item>
    <item>
      <title>Android 03</title>
      <description>
        <![CDATA[This exercise will guide you through the process of extracting simple information from an APK]]>
      </description>
      <pubDate>Sun, 14 Oct 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/android-03</link>
      <guid>https://pentesterlab.com/exercises/android-03</guid>
    </item>
    <item>
      <title>From SQL injection to Shell III</title>
      <description>
        <![CDATA[This exercise covers how to gain access to an administration interface using SQL injection followed by how to get command execution using ImageTragick]]>
      </description>
      <pubDate>Wed, 10 Oct 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/from-sqli-to-shell-iii</link>
      <guid>https://pentesterlab.com/exercises/from-sqli-to-shell-iii</guid>
    </item>
    <item>
      <title>PCAP 21</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sun, 30 Sep 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-21</link>
      <guid>https://pentesterlab.com/exercises/pcap-21</guid>
    </item>
    <item>
      <title>PCAP 22</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sun, 30 Sep 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-22</link>
      <guid>https://pentesterlab.com/exercises/pcap-22</guid>
    </item>
    <item>
      <title>PCAP 23</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sun, 30 Sep 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-23</link>
      <guid>https://pentesterlab.com/exercises/pcap-23</guid>
    </item>
    <item>
      <title>PCAP 24</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sun, 30 Sep 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-24</link>
      <guid>https://pentesterlab.com/exercises/pcap-24</guid>
    </item>
    <item>
      <title>PCAP 25</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sun, 30 Sep 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-25</link>
      <guid>https://pentesterlab.com/exercises/pcap-25</guid>
    </item>
    <item>
      <title>Android 02</title>
      <description>
        <![CDATA[This exercise will guide you through the process of extracting data from a simple database used by an Android app]]>
      </description>
      <pubDate>Mon, 17 Sep 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/android-02</link>
      <guid>https://pentesterlab.com/exercises/android-02</guid>
    </item>
    <item>
      <title>IDOR to Shell</title>
      <description>
        <![CDATA[This exercise covers how to get code execution by chaining vulnerabilities in a Ruby-on-Rails application]]>
      </description>
      <pubDate>Fri, 07 Sep 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/idor-to-shell</link>
      <guid>https://pentesterlab.com/exercises/idor-to-shell</guid>
    </item>
    <item>
      <title>Android 01</title>
      <description>
        <![CDATA[This exercise will guide you through the process of extracting simple information from an APK]]>
      </description>
      <pubDate>Fri, 31 Aug 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/android-01</link>
      <guid>https://pentesterlab.com/exercises/android-01</guid>
    </item>
    <item>
      <title>Introduction to CSP</title>
      <description>
        <![CDATA[This exercise details the exploitation of a XSS in a simple web application that uses Content Security Policy]]>
      </description>
      <pubDate>Thu, 23 Aug 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/csp</link>
      <guid>https://pentesterlab.com/exercises/csp</guid>
    </item>
    <item>
      <title>CVE-2018-11235: Git Submodule RCE</title>
      <description>
        <![CDATA[This exercise details the exploitation of a vulnerability in Git Sub
module that can be used to get command execution]]>
      </description>
      <pubDate>Wed, 18 Jul 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2018-11235</link>
      <guid>https://pentesterlab.com/exercises/cve-2018-11235</guid>
    </item>
    <item>
      <title>Git Information Leak II</title>
      <description>
        <![CDATA[This exercise details how to retrieve information from an exposed .git directory on a web server, provided directory listing is disabled]]>
      </description>
      <pubDate>Tue, 19 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/gitleak-ii</link>
      <guid>https://pentesterlab.com/exercises/gitleak-ii</guid>
    </item>
    <item>
      <title>Git Information Leak</title>
      <description>
        <![CDATA[This exercise details how to retrieve information from an exposed .git directory on a web server]]>
      </description>
      <pubDate>Tue, 05 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/gitleak</link>
      <guid>https://pentesterlab.com/exercises/gitleak</guid>
    </item>
    <item>
      <title>PCAP 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-01</link>
      <guid>https://pentesterlab.com/exercises/pcap-01</guid>
    </item>
    <item>
      <title>PCAP 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-02</link>
      <guid>https://pentesterlab.com/exercises/pcap-02</guid>
    </item>
    <item>
      <title>PCAP 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-03</link>
      <guid>https://pentesterlab.com/exercises/pcap-03</guid>
    </item>
    <item>
      <title>PCAP 04</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-04</link>
      <guid>https://pentesterlab.com/exercises/pcap-04</guid>
    </item>
    <item>
      <title>PCAP 05</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-05</link>
      <guid>https://pentesterlab.com/exercises/pcap-05</guid>
    </item>
    <item>
      <title>PCAP 06</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-06</link>
      <guid>https://pentesterlab.com/exercises/pcap-06</guid>
    </item>
    <item>
      <title>PCAP 07</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-07</link>
      <guid>https://pentesterlab.com/exercises/pcap-07</guid>
    </item>
    <item>
      <title>PCAP 08</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-08</link>
      <guid>https://pentesterlab.com/exercises/pcap-08</guid>
    </item>
    <item>
      <title>PCAP 09</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-09</link>
      <guid>https://pentesterlab.com/exercises/pcap-09</guid>
    </item>
    <item>
      <title>PCAP 10</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-10</link>
      <guid>https://pentesterlab.com/exercises/pcap-10</guid>
    </item>
    <item>
      <title>PCAP 11</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-11</link>
      <guid>https://pentesterlab.com/exercises/pcap-11</guid>
    </item>
    <item>
      <title>PCAP 12</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-12</link>
      <guid>https://pentesterlab.com/exercises/pcap-12</guid>
    </item>
    <item>
      <title>PCAP 13</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-13</link>
      <guid>https://pentesterlab.com/exercises/pcap-13</guid>
    </item>
    <item>
      <title>PCAP 14</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-14</link>
      <guid>https://pentesterlab.com/exercises/pcap-14</guid>
    </item>
    <item>
      <title>PCAP 15</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-15</link>
      <guid>https://pentesterlab.com/exercises/pcap-15</guid>
    </item>
    <item>
      <title>PCAP 16</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-16</link>
      <guid>https://pentesterlab.com/exercises/pcap-16</guid>
    </item>
    <item>
      <title>PCAP 17</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-17</link>
      <guid>https://pentesterlab.com/exercises/pcap-17</guid>
    </item>
    <item>
      <title>PCAP 18</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-18</link>
      <guid>https://pentesterlab.com/exercises/pcap-18</guid>
    </item>
    <item>
      <title>PCAP 19</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-19</link>
      <guid>https://pentesterlab.com/exercises/pcap-19</guid>
    </item>
    <item>
      <title>PCAP 20</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn how to analyze PCAP files]]>
      </description>
      <pubDate>Sat, 02 Jun 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pcap-20</link>
      <guid>https://pentesterlab.com/exercises/pcap-20</guid>
    </item>
    <item>
      <title>JWT VII</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a website using JWT for session without verifying the signature]]>
      </description>
      <pubDate>Wed, 30 May 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-vii</link>
      <guid>https://pentesterlab.com/exercises/jwt-vii</guid>
    </item>
    <item>
      <title>CVE-2016-5386: HTTPoxy/Golang HTTProxy namespace conflict</title>
      <description>
        <![CDATA[This exercise covers the exploitation of HTTPoxy against an old version of Golang]]>
      </description>
      <pubDate>Fri, 18 May 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2016-5386</link>
      <guid>https://pentesterlab.com/exercises/cve-2016-5386</guid>
    </item>
    <item>
      <title>Unix 31</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Fri, 06 Apr 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-31</link>
      <guid>https://pentesterlab.com/exercises/unix-31</guid>
    </item>
    <item>
      <title>Unix 30</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Fri, 06 Apr 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-30</link>
      <guid>https://pentesterlab.com/exercises/unix-30</guid>
    </item>
    <item>
      <title>Unix 25</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Fri, 06 Apr 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-25</link>
      <guid>https://pentesterlab.com/exercises/unix-25</guid>
    </item>
    <item>
      <title>Unix 32</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Fri, 06 Apr 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-32</link>
      <guid>https://pentesterlab.com/exercises/unix-32</guid>
    </item>
    <item>
      <title>Unix 34</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Fri, 06 Apr 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-34</link>
      <guid>https://pentesterlab.com/exercises/unix-34</guid>
    </item>
    <item>
      <title>Unix 33</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Fri, 06 Apr 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-33</link>
      <guid>https://pentesterlab.com/exercises/unix-33</guid>
    </item>
    <item>
      <title>Unix 27</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Fri, 06 Apr 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-27</link>
      <guid>https://pentesterlab.com/exercises/unix-27</guid>
    </item>
    <item>
      <title>Unix 29</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Fri, 06 Apr 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-29</link>
      <guid>https://pentesterlab.com/exercises/unix-29</guid>
    </item>
    <item>
      <title>Unix 28</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Fri, 06 Apr 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-28</link>
      <guid>https://pentesterlab.com/exercises/unix-28</guid>
    </item>
    <item>
      <title>Unix 26</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Fri, 06 Apr 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-26</link>
      <guid>https://pentesterlab.com/exercises/unix-26</guid>
    </item>
    <item>
      <title>CBC-MAC II</title>
      <description>
        <![CDATA[This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV]]>
      </description>
      <pubDate>Thu, 29 Mar 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cbc-mac-ii</link>
      <guid>https://pentesterlab.com/exercises/cbc-mac-ii</guid>
    </item>
    <item>
      <title>JWT VI</title>
      <description>
        <![CDATA[This exercise covers the exploitation of an injection in the kid element of a JWT. This injection can be used to bypass the signature mechanism]]>
      </description>
      <pubDate>Tue, 20 Mar 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-vi</link>
      <guid>https://pentesterlab.com/exercises/jwt-vi</guid>
    </item>
    <item>
      <title>CVE-2018-6574: go get RCE</title>
      <description>
        <![CDATA[This exercise covers a remote command execution in Golang's go get command.]]>
      </description>
      <pubDate>Thu, 08 Mar 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2018-6574</link>
      <guid>https://pentesterlab.com/exercises/cve-2018-6574</guid>
    </item>
    <item>
      <title>Unix 11</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-11</link>
      <guid>https://pentesterlab.com/exercises/unix-11</guid>
    </item>
    <item>
      <title>Unix 12</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-12</link>
      <guid>https://pentesterlab.com/exercises/unix-12</guid>
    </item>
    <item>
      <title>Unix 13</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-13</link>
      <guid>https://pentesterlab.com/exercises/unix-13</guid>
    </item>
    <item>
      <title>Unix 14</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-14</link>
      <guid>https://pentesterlab.com/exercises/unix-14</guid>
    </item>
    <item>
      <title>Unix 15</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-15</link>
      <guid>https://pentesterlab.com/exercises/unix-15</guid>
    </item>
    <item>
      <title>Unix 16</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-16</link>
      <guid>https://pentesterlab.com/exercises/unix-16</guid>
    </item>
    <item>
      <title>Unix 17</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-17</link>
      <guid>https://pentesterlab.com/exercises/unix-17</guid>
    </item>
    <item>
      <title>Unix 18</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-18</link>
      <guid>https://pentesterlab.com/exercises/unix-18</guid>
    </item>
    <item>
      <title>Unix 19</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-19</link>
      <guid>https://pentesterlab.com/exercises/unix-19</guid>
    </item>
    <item>
      <title>Unix 20</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-20</link>
      <guid>https://pentesterlab.com/exercises/unix-20</guid>
    </item>
    <item>
      <title>Unix 21</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-21</link>
      <guid>https://pentesterlab.com/exercises/unix-21</guid>
    </item>
    <item>
      <title>Unix 22</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-22</link>
      <guid>https://pentesterlab.com/exercises/unix-22</guid>
    </item>
    <item>
      <title>Unix 23</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-23</link>
      <guid>https://pentesterlab.com/exercises/unix-23</guid>
    </item>
    <item>
      <title>Unix 24</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Tue, 27 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-24</link>
      <guid>https://pentesterlab.com/exercises/unix-24</guid>
    </item>
    <item>
      <title>JWT V</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a trivial secret used to sign JWT tokens.]]>
      </description>
      <pubDate>Tue, 20 Feb 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-v</link>
      <guid>https://pentesterlab.com/exercises/jwt-v</guid>
    </item>
    <item>
      <title>Unix 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-01</link>
      <guid>https://pentesterlab.com/exercises/unix-01</guid>
    </item>
    <item>
      <title>Unix 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-02</link>
      <guid>https://pentesterlab.com/exercises/unix-02</guid>
    </item>
    <item>
      <title>Unix 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-03</link>
      <guid>https://pentesterlab.com/exercises/unix-03</guid>
    </item>
    <item>
      <title>Unix 04</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-04</link>
      <guid>https://pentesterlab.com/exercises/unix-04</guid>
    </item>
    <item>
      <title>Unix 05</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-05</link>
      <guid>https://pentesterlab.com/exercises/unix-05</guid>
    </item>
    <item>
      <title>Unix 06</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-06</link>
      <guid>https://pentesterlab.com/exercises/unix-06</guid>
    </item>
    <item>
      <title>Unix 07</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-07</link>
      <guid>https://pentesterlab.com/exercises/unix-07</guid>
    </item>
    <item>
      <title>Unix 08</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-08</link>
      <guid>https://pentesterlab.com/exercises/unix-08</guid>
    </item>
    <item>
      <title>Unix 09</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-09</link>
      <guid>https://pentesterlab.com/exercises/unix-09</guid>
    </item>
    <item>
      <title>Unix 10</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Wed, 24 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-10</link>
      <guid>https://pentesterlab.com/exercises/unix-10</guid>
    </item>
    <item>
      <title>Unix 00</title>
      <description>
        <![CDATA[This exercise is one of our challenges to help you learn more about Unix/Linux]]>
      </description>
      <pubDate>Sun, 21 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unix-00</link>
      <guid>https://pentesterlab.com/exercises/unix-00</guid>
    </item>
    <item>
      <title>CVE-2018-0114</title>
      <description>
        <![CDATA[This exercise details
 the exploitation of a vulnerability in Cisco's node-jose, a JavaScript library created to manage JWT]]>
      </description>
      <pubDate>Mon, 15 Jan 2018 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2018-0114</link>
      <guid>https://pentesterlab.com/exercises/cve-2018-0114</guid>
    </item>
    <item>
      <title>JWT IV</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a vulnerability similar to the recent CVE-2017-17405 impacting Ruby Net::FTP]]>
      </description>
      <pubDate>Sun, 31 Dec 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-iv</link>
      <guid>https://pentesterlab.com/exercises/jwt-iv</guid>
    </item>
    <item>
      <title>CBC-MAC</title>
      <description>
        <![CDATA[This exercise covers the exploitation of signature of non-fixed size messages with CBC-MAC]]>
      </description>
      <pubDate>Tue, 26 Dec 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cbc-mac</link>
      <guid>https://pentesterlab.com/exercises/cbc-mac</guid>
    </item>
    <item>
      <title>JWT kid Injection</title>
      <description>
        <![CDATA[This exercise covers the exploitation of an issue in the usage of JWT token]]>
      </description>
      <pubDate>Sun, 17 Dec 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-iii</link>
      <guid>https://pentesterlab.com/exercises/jwt-iii</guid>
    </item>
    <item>
      <title>Code Execution 09</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Code Execution]]>
      </description>
      <pubDate>Wed, 15 Nov 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codexec-09</link>
      <guid>https://pentesterlab.com/exercises/codexec-09</guid>
    </item>
    <item>
      <title>Server Side Template Injection 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Server-Side Template Injection]]>
      </description>
      <pubDate>Mon, 13 Nov 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ssti-02</link>
      <guid>https://pentesterlab.com/exercises/ssti-02</guid>
    </item>
    <item>
      <title>MongoDB Injection 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on vulnerabilities related to MongoDB]]>
      </description>
      <pubDate>Thu, 09 Nov 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mongo-02</link>
      <guid>https://pentesterlab.com/exercises/mongo-02</guid>
    </item>
    <item>
      <title>Authorization 06</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authorisation issues]]>
      </description>
      <pubDate>Mon, 06 Nov 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/autho-06</link>
      <guid>https://pentesterlab.com/exercises/autho-06</guid>
    </item>
    <item>
      <title>Code Execution 08</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Code Execution]]>
      </description>
      <pubDate>Mon, 23 Oct 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codexec-08</link>
      <guid>https://pentesterlab.com/exercises/codexec-08</guid>
    </item>
    <item>
      <title>Authorization 04</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authorisation issues]]>
      </description>
      <pubDate>Mon, 16 Oct 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/autho-04</link>
      <guid>https://pentesterlab.com/exercises/autho-04</guid>
    </item>
    <item>
      <title>Authorization 05</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authorisation issues]]>
      </description>
      <pubDate>Mon, 16 Oct 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/autho-05</link>
      <guid>https://pentesterlab.com/exercises/autho-05</guid>
    </item>
    <item>
      <title>Command Execution 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Command Execution]]>
      </description>
      <pubDate>Wed, 11 Oct 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/comexec-03</link>
      <guid>https://pentesterlab.com/exercises/comexec-03</guid>
    </item>
    <item>
      <title>Server Side Template Injection 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Server-Side Template Injection]]>
      </description>
      <pubDate>Sun, 08 Oct 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ssti-01</link>
      <guid>https://pentesterlab.com/exercises/ssti-01</guid>
    </item>
    <item>
      <title>Code Execution 05</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Code Execution]]>
      </description>
      <pubDate>Tue, 03 Oct 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codexec-05</link>
      <guid>https://pentesterlab.com/exercises/codexec-05</guid>
    </item>
    <item>
      <title>Code Execution 06</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Code Execution]]>
      </description>
      <pubDate>Tue, 03 Oct 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codexec-06</link>
      <guid>https://pentesterlab.com/exercises/codexec-06</guid>
    </item>
    <item>
      <title>Code Execution 07</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Code Execution]]>
      </description>
      <pubDate>Tue, 03 Oct 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codexec-07</link>
      <guid>https://pentesterlab.com/exercises/codexec-07</guid>
    </item>
    <item>
      <title>Introduction to code review</title>
      <description>
        <![CDATA[This exercise covers the different ways to perform code review. It also contains a simple application to review to help you get started.]]>
      </description>
      <pubDate>Mon, 25 Sep 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codereview</link>
      <guid>https://pentesterlab.com/exercises/codereview</guid>
    </item>
    <item>
      <title>S2-052</title>
      <description>
        <![CDATA[This exercise covers the exploitation of the Struts S2-052 vulnerability]]>
      </description>
      <pubDate>Fri, 15 Sep 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/s2-052</link>
      <guid>https://pentesterlab.com/exercises/s2-052</guid>
    </item>
    <item>
      <title>SQL Injection 06</title>
      <description>
        <![CDATA[This exercise is one of our challenges on SQL Injections]]>
      </description>
      <pubDate>Tue, 29 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/sqli-06</link>
      <guid>https://pentesterlab.com/exercises/sqli-06</guid>
    </item>
    <item>
      <title>XML Attacks 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on vulnerabilities related to XML processing]]>
      </description>
      <pubDate>Fri, 25 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xml-01</link>
      <guid>https://pentesterlab.com/exercises/xml-01</guid>
    </item>
    <item>
      <title>XML Attacks 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on vulnerabilities related to XML processing]]>
      </description>
      <pubDate>Fri, 25 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xml-02</link>
      <guid>https://pentesterlab.com/exercises/xml-02</guid>
    </item>
    <item>
      <title>SQL Injection 04</title>
      <description>
        <![CDATA[This exercise is one of our challenges on SQL Injections]]>
      </description>
      <pubDate>Thu, 24 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/sqli-04</link>
      <guid>https://pentesterlab.com/exercises/sqli-04</guid>
    </item>
    <item>
      <title>SQL Injection 05</title>
      <description>
        <![CDATA[This exercise is one of our challenges on SQL Injections]]>
      </description>
      <pubDate>Thu, 24 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/sqli-05</link>
      <guid>https://pentesterlab.com/exercises/sqli-05</guid>
    </item>
    <item>
      <title>SQL Injection 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on SQL Injections]]>
      </description>
      <pubDate>Wed, 23 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/sqli-01</link>
      <guid>https://pentesterlab.com/exercises/sqli-01</guid>
    </item>
    <item>
      <title>SQL Injection 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on SQL Injections]]>
      </description>
      <pubDate>Wed, 23 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/sqli-02</link>
      <guid>https://pentesterlab.com/exercises/sqli-02</guid>
    </item>
    <item>
      <title>SQL Injection 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges on SQL Injections]]>
      </description>
      <pubDate>Wed, 23 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/sqli-03</link>
      <guid>https://pentesterlab.com/exercises/sqli-03</guid>
    </item>
    <item>
      <title>Code Execution 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Code Execution]]>
      </description>
      <pubDate>Sun, 13 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codexec-02</link>
      <guid>https://pentesterlab.com/exercises/codexec-02</guid>
    </item>
    <item>
      <title>Authorization 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authorisation issues]]>
      </description>
      <pubDate>Sun, 13 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/autho-03</link>
      <guid>https://pentesterlab.com/exercises/autho-03</guid>
    </item>
    <item>
      <title>Command Execution 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Command Execution]]>
      </description>
      <pubDate>Sun, 13 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/comexec-01</link>
      <guid>https://pentesterlab.com/exercises/comexec-01</guid>
    </item>
    <item>
      <title>Command Execution 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Command Execution]]>
      </description>
      <pubDate>Sun, 13 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/comexec-02</link>
      <guid>https://pentesterlab.com/exercises/comexec-02</guid>
    </item>
    <item>
      <title>Server Side Request Forgery 04</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Server-Side Request Forgery]]>
      </description>
      <pubDate>Sat, 12 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ssrf-04</link>
      <guid>https://pentesterlab.com/exercises/ssrf-04</guid>
    </item>
    <item>
      <title>Open Redirect 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Open Redirect]]>
      </description>
      <pubDate>Fri, 11 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/openred-01</link>
      <guid>https://pentesterlab.com/exercises/openred-01</guid>
    </item>
    <item>
      <title>Open Redirect 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Open Redirect]]>
      </description>
      <pubDate>Fri, 11 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/openred-02</link>
      <guid>https://pentesterlab.com/exercises/openred-02</guid>
    </item>
    <item>
      <title>MongoDB Injection 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on vulnerabilities related to MongoDB]]>
      </description>
      <pubDate>Fri, 11 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mongo-01</link>
      <guid>https://pentesterlab.com/exercises/mongo-01</guid>
    </item>
    <item>
      <title>SAML: Introduction</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a signature stripping vulnerability in SAML]]>
      </description>
      <pubDate>Thu, 10 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/saml</link>
      <guid>https://pentesterlab.com/exercises/saml</guid>
    </item>
    <item>
      <title>Server Side Request Forgery 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Server-Side Request Forgery]]>
      </description>
      <pubDate>Wed, 09 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ssrf-02</link>
      <guid>https://pentesterlab.com/exercises/ssrf-02</guid>
    </item>
    <item>
      <title>Server Side Request Forgery 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Server-Side Request Forgery]]>
      </description>
      <pubDate>Wed, 09 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ssrf-03</link>
      <guid>https://pentesterlab.com/exercises/ssrf-03</guid>
    </item>
    <item>
      <title>Server Side Request Forgery 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Server-Side Request Forgery]]>
      </description>
      <pubDate>Thu, 03 Aug 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ssrf-01</link>
      <guid>https://pentesterlab.com/exercises/ssrf-01</guid>
    </item>
    <item>
      <title>XSS 09</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Cross-Site Scripting]]>
      </description>
      <pubDate>Fri, 21 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-09</link>
      <guid>https://pentesterlab.com/exercises/xss-09</guid>
    </item>
    <item>
      <title>XSS 10</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Cross-Site Scripting]]>
      </description>
      <pubDate>Fri, 21 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-10</link>
      <guid>https://pentesterlab.com/exercises/xss-10</guid>
    </item>
    <item>
      <title>Directory Traversal 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Directory Traversal]]>
      </description>
      <pubDate>Tue, 18 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/dirtrav-01</link>
      <guid>https://pentesterlab.com/exercises/dirtrav-01</guid>
    </item>
    <item>
      <title>Directory Traversal 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Directory Traversal]]>
      </description>
      <pubDate>Tue, 18 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/dirtrav-02</link>
      <guid>https://pentesterlab.com/exercises/dirtrav-02</guid>
    </item>
    <item>
      <title>Directory Traversal 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Directory Traversal]]>
      </description>
      <pubDate>Tue, 18 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/dirtrav-03</link>
      <guid>https://pentesterlab.com/exercises/dirtrav-03</guid>
    </item>
    <item>
      <title>XSS 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Cross-Site Scripting]]>
      </description>
      <pubDate>Fri, 14 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-02</link>
      <guid>https://pentesterlab.com/exercises/xss-02</guid>
    </item>
    <item>
      <title>XSS 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Cross-Site Scripting]]>
      </description>
      <pubDate>Fri, 14 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-03</link>
      <guid>https://pentesterlab.com/exercises/xss-03</guid>
    </item>
    <item>
      <title>XSS 04</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Cross-Site Scripting]]>
      </description>
      <pubDate>Fri, 14 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-04</link>
      <guid>https://pentesterlab.com/exercises/xss-04</guid>
    </item>
    <item>
      <title>XSS 05</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Cross-Site Scripting]]>
      </description>
      <pubDate>Fri, 14 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-05</link>
      <guid>https://pentesterlab.com/exercises/xss-05</guid>
    </item>
    <item>
      <title>XSS 06</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Cross-Site Scripting]]>
      </description>
      <pubDate>Fri, 14 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-06</link>
      <guid>https://pentesterlab.com/exercises/xss-06</guid>
    </item>
    <item>
      <title>XSS 07</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Cross-Site Scripting]]>
      </description>
      <pubDate>Fri, 14 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-07</link>
      <guid>https://pentesterlab.com/exercises/xss-07</guid>
    </item>
    <item>
      <title>XSS 08</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Cross-Site Scripting]]>
      </description>
      <pubDate>Fri, 14 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-08</link>
      <guid>https://pentesterlab.com/exercises/xss-08</guid>
    </item>
    <item>
      <title>File Upload 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Upload vulnerabilities]]>
      </description>
      <pubDate>Fri, 14 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/upload-01</link>
      <guid>https://pentesterlab.com/exercises/upload-01</guid>
    </item>
    <item>
      <title>File Upload 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Upload vulnerabilities]]>
      </description>
      <pubDate>Fri, 14 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/upload-02</link>
      <guid>https://pentesterlab.com/exercises/upload-02</guid>
    </item>
    <item>
      <title>XSS 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Cross-Site Scripting]]>
      </description>
      <pubDate>Thu, 13 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-01</link>
      <guid>https://pentesterlab.com/exercises/xss-01</guid>
    </item>
    <item>
      <title>Authentication 05</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authentication issues]]>
      </description>
      <pubDate>Mon, 03 Jul 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/authe-05</link>
      <guid>https://pentesterlab.com/exercises/authe-05</guid>
    </item>
    <item>
      <title>Code Execution 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Code Execution]]>
      </description>
      <pubDate>Thu, 01 Jun 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codexec-03</link>
      <guid>https://pentesterlab.com/exercises/codexec-03</guid>
    </item>
    <item>
      <title>Code Execution 04</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Code Execution]]>
      </description>
      <pubDate>Thu, 01 Jun 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codexec-04</link>
      <guid>https://pentesterlab.com/exercises/codexec-04</guid>
    </item>
    <item>
      <title>File Include 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on File Include vulnerabilities]]>
      </description>
      <pubDate>Thu, 25 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/fileinc-01</link>
      <guid>https://pentesterlab.com/exercises/fileinc-01</guid>
    </item>
    <item>
      <title>File Include 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on File Include vulnerabilities]]>
      </description>
      <pubDate>Thu, 25 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/fileinc-02</link>
      <guid>https://pentesterlab.com/exercises/fileinc-02</guid>
    </item>
    <item>
      <title>LDAP 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on vulnerabilities related to LDAP]]>
      </description>
      <pubDate>Thu, 25 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ldap-01</link>
      <guid>https://pentesterlab.com/exercises/ldap-01</guid>
    </item>
    <item>
      <title>LDAP 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on vulnerabilities related to LDAP]]>
      </description>
      <pubDate>Thu, 25 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ldap-02</link>
      <guid>https://pentesterlab.com/exercises/ldap-02</guid>
    </item>
    <item>
      <title>Authentication 04</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authentication issues]]>
      </description>
      <pubDate>Fri, 19 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/authe-04</link>
      <guid>https://pentesterlab.com/exercises/authe-04</guid>
    </item>
    <item>
      <title>Authentication 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authentication issues]]>
      </description>
      <pubDate>Thu, 18 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/authe-01</link>
      <guid>https://pentesterlab.com/exercises/authe-01</guid>
    </item>
    <item>
      <title>Authentication 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authentication issues]]>
      </description>
      <pubDate>Thu, 18 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/authe-02</link>
      <guid>https://pentesterlab.com/exercises/authe-02</guid>
    </item>
    <item>
      <title>Authentication 03</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authentication issues]]>
      </description>
      <pubDate>Thu, 18 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/authe-03</link>
      <guid>https://pentesterlab.com/exercises/authe-03</guid>
    </item>
    <item>
      <title>Authorization 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authorisation issues]]>
      </description>
      <pubDate>Thu, 18 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/autho-01</link>
      <guid>https://pentesterlab.com/exercises/autho-01</guid>
    </item>
    <item>
      <title>Authorization 02</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Authorisation issues]]>
      </description>
      <pubDate>Thu, 18 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/autho-02</link>
      <guid>https://pentesterlab.com/exercises/autho-02</guid>
    </item>
    <item>
      <title>Code Execution 01</title>
      <description>
        <![CDATA[This exercise is one of our challenges on Code Execution]]>
      </description>
      <pubDate>Thu, 18 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/codexec-01</link>
      <guid>https://pentesterlab.com/exercises/codexec-01</guid>
    </item>
    <item>
      <title>CVE-2016-10033: PHPMailer RCE</title>
      <description>
        <![CDATA[This exercise covers a remote code execution vulnerability in PHPMailer]]>
      </description>
      <pubDate>Mon, 01 May 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2016-10033</link>
      <guid>https://pentesterlab.com/exercises/cve-2016-10033</guid>
    </item>
    <item>
      <title>Cipher block chaining</title>
      <description>
        <![CDATA[This exercise details how to tamper with data encrypted using CBC]]>
      </description>
      <pubDate>Fri, 07 Apr 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cbc</link>
      <guid>https://pentesterlab.com/exercises/cbc</guid>
    </item>
    <item>
      <title>Struts s2-045</title>
      <description>
        <![CDATA[This exercise covers a Remote Code Execution in Struts 2.]]>
      </description>
      <pubDate>Tue, 28 Mar 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/s2-045</link>
      <guid>https://pentesterlab.com/exercises/s2-045</guid>
    </item>
    <item>
      <title>CVE-2016-2098</title>
      <description>
        <![CDATA[This exercise covers a remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data]]>
      </description>
      <pubDate>Mon, 20 Mar 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2016-2098</link>
      <guid>https://pentesterlab.com/exercises/cve-2016-2098</guid>
    </item>
    <item>
      <title>CVE-2014-4511: Gitlist RCE</title>
      <description>
        <![CDATA[This exercise explains how you can exploit a vulnerability published in 2014 in Gitlist.]]>
      </description>
      <pubDate>Tue, 14 Feb 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2014-4511</link>
      <guid>https://pentesterlab.com/exercises/cve-2014-4511</guid>
    </item>
    <item>
      <title>ECDSA</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a weakness in the usage of ECDSA]]>
      </description>
      <pubDate>Mon, 30 Jan 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ecdsa</link>
      <guid>https://pentesterlab.com/exercises/ecdsa</guid>
    </item>
    <item>
      <title>Werkzeug DEBUG</title>
      <description>
        <![CDATA[This challenge was written for Ruxcon CTF 2015 and cover the Debug mode of Werkzeug/Flask]]>
      </description>
      <pubDate>Fri, 13 Jan 2017 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/werkzeug-debug</link>
      <guid>https://pentesterlab.com/exercises/werkzeug-debug</guid>
    </item>
    <item>
      <title>Padding Oracle</title>
      <description>
        <![CDATA[This exercise covers an attack against CBC mode. This attack can be used to decrypt data and re-encrypt arbitrary data]]>
      </description>
      <pubDate>Fri, 09 Dec 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/padding-oracle</link>
      <guid>https://pentesterlab.com/exercises/padding-oracle</guid>
    </item>
    <item>
      <title>Unickle</title>
      <description>
        <![CDATA[This challenge was written for Ruxcon CTF 2015. It's an SQL injection mixed with a remote code execution.]]>
      </description>
      <pubDate>Wed, 16 Nov 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/unickle</link>
      <guid>https://pentesterlab.com/exercises/unickle</guid>
    </item>
    <item>
      <title>CVE-2015-3224</title>
      <description>
        <![CDATA[This exercise is a challenge written for Nullcon CTF in 2015]]>
      </description>
      <pubDate>Mon, 17 Oct 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2015-3224</link>
      <guid>https://pentesterlab.com/exercises/cve-2015-3224</guid>
    </item>
    <item>
      <title>Luhn</title>
      <description>
        <![CDATA[This challenge was written for Ruxcon CTF 2015. It's an SQL injection with a twist]]>
      </description>
      <pubDate>Mon, 17 Oct 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/luhn</link>
      <guid>https://pentesterlab.com/exercises/luhn</guid>
    </item>
    <item>
      <title>Introduction 00</title>
      <description>
        <![CDATA[This exercise will guide you through the process of scoring on an exercise to get it marked as completed]]>
      </description>
      <pubDate>Sun, 02 Oct 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/intro00</link>
      <guid>https://pentesterlab.com/exercises/intro00</guid>
    </item>
    <item>
      <title>Introduction 01</title>
      <description>
        <![CDATA[This exercise will guide through the process of scoring an exercise to mark it as completed]]>
      </description>
      <pubDate>Tue, 13 Sep 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/intro01</link>
      <guid>https://pentesterlab.com/exercises/intro01</guid>
    </item>
    <item>
      <title>Introduction 02</title>
      <description>
        <![CDATA[This exercise will guide through the process of scoring an exercise to mark it as completed. Finding the key is just a little bit harder than the previous exercise.]]>
      </description>
      <pubDate>Tue, 13 Sep 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/intro02</link>
      <guid>https://pentesterlab.com/exercises/intro02</guid>
    </item>
    <item>
      <title>Introduction 03</title>
      <description>
        <![CDATA[This exercise will guide through the process of scoring an exercise to mark it as completed. However, this time, you will run commands on the underlying operating system. You will need to run the score command with your UUID.]]>
      </description>
      <pubDate>Tue, 13 Sep 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/intro03</link>
      <guid>https://pentesterlab.com/exercises/intro03</guid>
    </item>
    <item>
      <title>CVE-2013-0156: Rails Object Injection</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a code execution in Ruby-on-Rails using XML and YAML.]]>
      </description>
      <pubDate>Mon, 01 Aug 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2013-0156</link>
      <guid>https://pentesterlab.com/exercises/cve-2013-0156</guid>
    </item>
    <item>
      <title>JWT Algorithm Confusion</title>
      <description>
        <![CDATA[This exercise covers the exploitation of an issue with some implementations of JWT]]>
      </description>
      <pubDate>Wed, 01 Jun 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt-algorithm-confusion</link>
      <guid>https://pentesterlab.com/exercises/jwt-algorithm-confusion</guid>
    </item>
    <item>
      <title>CVE-2016-0792</title>
      <description>
        <![CDATA[This exercise covers the exploitation of an Xstream vulnerability in Jenkins]]>
      </description>
      <pubDate>Mon, 16 May 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2016-0792</link>
      <guid>https://pentesterlab.com/exercises/cve-2016-0792</guid>
    </item>
    <item>
      <title>ObjectInputStream</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a call to readObject in a Spring application]]>
      </description>
      <pubDate>Sun, 10 Apr 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/objectinputstream</link>
      <guid>https://pentesterlab.com/exercises/objectinputstream</guid>
    </item>
    <item>
      <title>XMLDecoder</title>
      <description>
        <![CDATA[This exercise covers the exploitation of an application using XMLDecoder]]>
      </description>
      <pubDate>Sat, 12 Mar 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xmldecoder</link>
      <guid>https://pentesterlab.com/exercises/xmldecoder</guid>
    </item>
    <item>
      <title>CVE-2014-1266</title>
      <description>
        <![CDATA[This exercise covers how to intercept an HTTPs connection]]>
      </description>
      <pubDate>Thu, 21 Jan 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mitm-v</link>
      <guid>https://pentesterlab.com/exercises/mitm-v</guid>
    </item>
    <item>
      <title>CVE-2011-0228</title>
      <description>
        <![CDATA[This exercise covers how to intercept an HTTPs connection]]>
      </description>
      <pubDate>Mon, 18 Jan 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mitm-iv</link>
      <guid>https://pentesterlab.com/exercises/mitm-iv</guid>
    </item>
    <item>
      <title>Intercept 03</title>
      <description>
        <![CDATA[This exercise covers how to intercept an HTTPs connection with hostname verification.]]>
      </description>
      <pubDate>Mon, 11 Jan 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mitm-iii</link>
      <guid>https://pentesterlab.com/exercises/mitm-iii</guid>
    </item>
    <item>
      <title>Intercept 02</title>
      <description>
        <![CDATA[This exercise covers how to intercept an HTTPs connection.]]>
      </description>
      <pubDate>Sun, 10 Jan 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mitm-ii</link>
      <guid>https://pentesterlab.com/exercises/mitm-ii</guid>
    </item>
    <item>
      <title>Intercept 01</title>
      <description>
        <![CDATA[This exercise covers how to intercept an HTTP connection.]]>
      </description>
      <pubDate>Sun, 03 Jan 2016 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/mitm</link>
      <guid>https://pentesterlab.com/exercises/mitm</guid>
    </item>
    <item>
      <title>Struts devMode</title>
      <description>
        <![CDATA[This exercise covers how to get code execution when a Struts application is running in devMode]]>
      </description>
      <pubDate>Thu, 17 Dec 2015 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/struts-devmode</link>
      <guid>https://pentesterlab.com/exercises/struts-devmode</guid>
    </item>
    <item>
      <title>JSON Web Token None Algorithm</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a signature weakness in a JWT library.]]>
      </description>
      <pubDate>Tue, 01 Dec 2015 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/jwt</link>
      <guid>https://pentesterlab.com/exercises/jwt</guid>
    </item>
    <item>
      <title>Cross-Origin Resource Sharing</title>
      <description>
        <![CDATA[This exercise covers Cross-Origin Resource Sharing and how it can be used to bypass CSRF protection if it's misconfigured]]>
      </description>
      <pubDate>Sat, 07 Nov 2015 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cors</link>
      <guid>https://pentesterlab.com/exercises/cors</guid>
    </item>
    <item>
      <title>API to Shell</title>
      <description>
        <![CDATA[This exercise covers the exploitation of PHP type confusion to bypass a signature and the exploitation of unserialize.]]>
      </description>
      <pubDate>Sat, 07 Nov 2015 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/api-to-shell</link>
      <guid>https://pentesterlab.com/exercises/api-to-shell</guid>
    </item>
    <item>
      <title>Pickle Code Execution</title>
      <description>
        <![CDATA[This exercise covers the exploitation of Python's pickle when used to deserialize untrusted data]]>
      </description>
      <pubDate>Wed, 07 Oct 2015 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/pickle</link>
      <guid>https://pentesterlab.com/exercises/pickle</guid>
    </item>
    <item>
      <title>Play XML Entities</title>
      <description>
        <![CDATA[This exercise covers the exploitation of XML entities in the Play framework]]>
      </description>
      <pubDate>Tue, 07 Apr 2015 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/play-xxe</link>
      <guid>https://pentesterlab.com/exercises/play-xxe</guid>
    </item>
    <item>
      <title>CVE-2014-6271/Shellshock</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a Bash vulnerability through a CGI.]]>
      </description>
      <pubDate>Wed, 08 Oct 2014 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2014-6271</link>
      <guid>https://pentesterlab.com/exercises/cve-2014-6271</guid>
    </item>
    <item>
      <title>Play Session Injection</title>
      <description>
        <![CDATA[This exercise covers the exploitation of a session injection in the Play framework. This issue can be used to tamper with the content of the session while bypassing the signing mechanism]]>
      </description>
      <pubDate>Tue, 24 Jun 2014 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/play-session-injection</link>
      <guid>https://pentesterlab.com/exercises/play-session-injection</guid>
    </item>
    <item>
      <title>CVE-2007-1860: mod_jk double-decoding</title>
      <description>
        <![CDATA[This exercise covers the exploitation of CVE-2007-1860. This vulnerability allows an attacker to gain access to inaccessible pages using crafted requests. This is a common trick that a lot of testers miss.]]>
      </description>
      <pubDate>Wed, 16 Apr 2014 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2007-1860</link>
      <guid>https://pentesterlab.com/exercises/cve-2007-1860</guid>
    </item>
    <item>
      <title>XSS and MySQL FILE</title>
      <description>
        <![CDATA[This exercise explains how to exploit a Cross-Site Scripting vulnerability to obtain an administrator's cookies, and how you can use their session to gain access to the administration panel, and find a SQL injection to gain code execution]]>
      </description>
      <pubDate>Sat, 07 Dec 2013 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/xss-and-mysql-file</link>
      <guid>https://pentesterlab.com/exercises/xss-and-mysql-file</guid>
    </item>
    <item>
      <title>Electronic Code Book</title>
      <description>
        <![CDATA[This exercise explains how you can tamper with encrypted cookies to access another user's account]]>
      </description>
      <pubDate>Tue, 01 Oct 2013 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/ecb</link>
      <guid>https://pentesterlab.com/exercises/ecb</guid>
    </item>
    <item>
      <title>Web for Pentester II</title>
      <description>
        <![CDATA[This exercise is a set of the most common web vulnerabilities.]]>
      </description>
      <pubDate>Mon, 15 Jul 2013 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/web-for-pentester-II</link>
      <guid>https://pentesterlab.com/exercises/web-for-pentester-II</guid>
    </item>
    <item>
      <title>From SQL Injection to Shell II</title>
      <description>
        <![CDATA[This exercise explains how you can, from a blind SQL injection, gain access to the administration console. Then once in the administration console, how you can run commands on the system.]]>
      </description>
      <pubDate>Mon, 15 Apr 2013 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/from-sqli-to-shell-ii</link>
      <guid>https://pentesterlab.com/exercises/from-sqli-to-shell-ii</guid>
    </item>
    <item>
      <title>CVE-2012-6081: MoinMoin code execution</title>
      <description>
        <![CDATA[This exercise explains how you can exploit CVE-2012-6081 to gain code execution. This vulnerability was exploited to compromise Debian's wiki and Python documentation website]]>
      </description>
      <pubDate>Fri, 15 Mar 2013 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2012-6081</link>
      <guid>https://pentesterlab.com/exercises/cve-2012-6081</guid>
    </item>
    <item>
      <title>Web for Pentester</title>
      <description>
        <![CDATA[This exercise is a set of the most common web vulnerabilities.]]>
      </description>
      <pubDate>Tue, 05 Feb 2013 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/web-for-pentester</link>
      <guid>https://pentesterlab.com/exercises/web-for-pentester</guid>
    </item>
    <item>
      <title>Axis2 Web service and Tomcat Manager</title>
      <description>
        <![CDATA[This exercise explains the interactions between Tomcat and Apache, then it shows how to call and attack an Axis2 Web service. Using information retrieved from this attack, you will be able to gain access to the Tomcat Manager and deploy a WebShell to gain command execution.]]>
      </description>
      <pubDate>Tue, 15 Jan 2013 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/axis2-and-tomcat-manager</link>
      <guid>https://pentesterlab.com/exercises/axis2-and-tomcat-manager</guid>
    </item>
    <item>
      <title>CVE-2008-1930: WordPress Cookie Integrity Flaw</title>
      <description>
        <![CDATA[This exercise explains how you can exploit CVE-2008-1930 to gain access to the administration interface of a Wordpress installation.]]>
      </description>
      <pubDate>Tue, 11 Dec 2012 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2008-1930</link>
      <guid>https://pentesterlab.com/exercises/cve-2008-1930</guid>
    </item>
    <item>
      <title>From SQL Injection to Shell: PostgreSQL edition</title>
      <description>
        <![CDATA[This exercise explains how you can from a SQL injection gain access to the administration console, and from there, how you can run commands on the  underlying system]]>
      </description>
      <pubDate>Fri, 07 Dec 2012 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/from-sqli-to-shell-pg-edition</link>
      <guid>https://pentesterlab.com/exercises/from-sqli-to-shell-pg-edition</guid>
    </item>
    <item>
      <title>Rack Cookies and Commands injection</title>
      <description>
        <![CDATA[After a short brute force introduction, this exercise explains the tampering of rack cookies and how you can even manage to modify a signed cookie (if the secret is trivial). Using this issue, you will be able to escalate your privileges and gain command execution]]>
      </description>
      <pubDate>Wed, 10 Oct 2012 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/rack-cookies-and-commands-injection</link>
      <guid>https://pentesterlab.com/exercises/rack-cookies-and-commands-injection</guid>
    </item>
    <item>
      <title>Linux Host Review</title>
      <description>
        <![CDATA[This exercise explains how to perform a Linux host review, what and how you can check the configuration of a Linux server to ensure it is securely configured. The reviewed system is a traditional Linux-Apache-Mysql-PHP (LAMP) server used to host a blog.]]>
      </description>
      <pubDate>Sat, 25 Aug 2012 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/linux-host-review</link>
      <guid>https://pentesterlab.com/exercises/linux-host-review</guid>
    </item>
    <item>
      <title>CVE-2012-2661: ActiveRecord SQL injection</title>
      <description>
        <![CDATA[This exercise explains how you can exploit CVE-2012-2661 to retrieve information from a database]]>
      </description>
      <pubDate>Wed, 13 Jun 2012 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2012-2661</link>
      <guid>https://pentesterlab.com/exercises/cve-2012-2661</guid>
    </item>
    <item>
      <title>CVE-2012-1823: PHP CGI</title>
      <description>
        <![CDATA[This exercise explains how you can exploit CVE-2012-1823 to retrieve the source code of an application and gain code execution.]]>
      </description>
      <pubDate>Tue, 29 May 2012 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/cve-2012-1823</link>
      <guid>https://pentesterlab.com/exercises/cve-2012-1823</guid>
    </item>
    <item>
      <title>PHP Include And Post Exploitation</title>
      <description>
        <![CDATA[This exercise describes the exploitation of a local file include with limited access. Once code execution is gained, you will see some post exploitation tricks.]]>
      </description>
      <pubDate>Thu, 01 Mar 2012 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/php-include-and-post-exploitation</link>
      <guid>https://pentesterlab.com/exercises/php-include-and-post-exploitation</guid>
    </item>
    <item>
      <title>From SQL Injection to Shell</title>
      <description>
        <![CDATA[This exercise demonstrates how to leverage a SQL injection to gain access to the admin console, and from there, how to execute commands on the underlying system]]>
      </description>
      <pubDate>Sun, 01 Jan 2012 00:00:00 +0000</pubDate>
      <link>https://pentesterlab.com/exercises/from-sqli-to-shell</link>
      <guid>https://pentesterlab.com/exercises/from-sqli-to-shell</guid>
    </item>
  </channel>
</rss>
