Course
This exercise explores Unicode transformations and their potential to trigger unexpected behaviors in web applications. You'll learn to exploit these transformations to bypass security measures and access restricted files.
Skills covered
Injection
Operating System
Network
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.