Course
This course explores the exploitation of a Spring (1.4.*) application with exposed Spring Actuators and Spring Cloud, allowing attackers to update the service's configuration and gain code execution. The exercise is based on research from the mbechler/marshalsec repository and the "Exploiting Spring Boot Actuators" article by Veracode.
Skills covered
Injection
Authentication
Operating System
Network
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.