Exercises
| Exercise | Avg. Time | Difficulty | Solved by | Tier | |
|---|---|---|---|---|---|
|
|
From SQL Injection to Shell
SQL Injection
This exercise demonstrates how to leverage a SQL injection to gain access to the admin console, and from there, how to execute commands on the underlying system
|
< 1 Hr. | 8280 | FREE | |
|
|
PHP Include And Post Exploitation
This exercise describes the exploitation of a local file include with limited access. Once code execution is gained, you will see some post exploitation tricks.
|
-- | 1 | FREE | |
|
|
CVE-2012-1823: PHP CGI
This exercise explains how you can exploit CVE-2012-1823 to retrieve the source code of an application and gain code execution.
|
-- | 1 | FREE | |
|
|
CVE-2012-2661: ActiveRecord SQL injection
This exercise explains how you can exploit CVE-2012-2661 to retrieve information from a database
|
-- | 0 | FREE | |
|
|
Linux Host Review
This exercise explains how to perform a Linux host review, what and how you can check the configuration of a Linux server to ensure it is securely configured. The reviewed system is a traditional Linux-Apache-Mysql-PHP (LAMP) server used to host a blog.
|
-- | 1 | FREE | |
|
|
Rack Cookies and Commands injection
After a short brute force introduction, this exercise explains the tampering of rack cookies and how you can even manage to modify a signed cookie (if the secret is trivial). Using this issue, you will be able to escalate your privileges and gain command execution
|
-- | 1 | FREE | |
|
|
From SQL Injection to Shell: PostgreSQL edition
SQL Injection
This exercise explains how you can from a SQL injection gain access to the administration console, and from there, how you can run commands on the underlying system
|
< 1 Hr. | 19 | FREE | |
|
|
CVE-2008-1930: WordPress Cookie Integrity Flaw
This exercise explains how you can exploit CVE-2008-1930 to gain access to the administration interface of a Wordpress installation.
|
< 1 Hr. | 26 | FREE | |
|
|
Axis2 Web service and Tomcat Manager
This exercise explains the interactions between Tomcat and Apache, then it shows how to call and attack an Axis2 Web service. Using information retrieved from this attack, you will be able to gain access to the Tomcat Manager and deploy a WebShell to gain command execution.
|
-- | 0 | FREE | |
|
|
Web for Pentester
This exercise is a set of the most common web vulnerabilities.
|
-- | 0 | FREE | |
|
|
CVE-2012-6081: MoinMoin code execution
This exercise explains how you can exploit CVE-2012-6081 to gain code execution. This vulnerability was exploited to compromise Debian's wiki and Python documentation website
|
-- | 0 | FREE | |
|
|
From SQL Injection to Shell II
SQL Injection
This exercise explains how you can, from a blind SQL injection, gain access to the administration console. Then once in the administration console, how you can run commands on the system.
|
1-2 Hr. | 45 | FREE | |
|
|
Web for Pentester II
This exercise is a set of the most common web vulnerabilities.
|
-- | 0 | FREE | |
|
|
Electronic Code Book
Crypto
This exercise explains how you can tamper with encrypted cookies to access another user's account
|
1-2 Hr. | 5928 | FREE | |
|
|
XSS and MySQL FILE
XSS
This exercise explains how to exploit a Cross-Site Scripting vulnerability to obtain an administrator's cookies, and how you can use their session to gain access to the administration panel, and find a SQL injection to gain code execution
|
-- | 0 | FREE | |
|
|
CVE-2007-1860: mod_jk double-decoding
This exercise covers the exploitation of CVE-2007-1860. This vulnerability allows an attacker to gain access to inaccessible pages using crafted requests. This is a common trick that a lot of testers miss.
|
1-2 Hr. | 6176 | FREE | |
|
|
Play Session Injection
This exercise covers the exploitation of a session injection in the Play framework. This issue can be used to tamper with the content of the session while bypassing the signing mechanism
|
< 1 Hr. | 2946 | FREE | |
|
|
CVE-2014-6271/Shellshock
This exercise covers the exploitation of a Bash vulnerability through a CGI.
|
< 1 Hr. | 9066 | FREE | |
|
|
Play XML Entities
This exercise covers the exploitation of XML entities in the Play framework
|
1-2 Hr. | 2297 | FREE | |
|
|
Pickle Code Execution
This exercise covers the exploitation of Python's pickle when used to deserialize untrusted data
|
< 1 Hr. | 6491 | PRO | |
|
|
Cross-Origin Resource Sharing
This exercise covers Cross-Origin Resource Sharing and how it can be used to bypass CSRF protection if it's misconfigured
|
-- | 0 | PRO | |
|
|
API to Shell
API
This exercise covers the exploitation of PHP type confusion to bypass a signature and the exploitation of unserialize.
|
2-4 Hr. | 3513 | PRO | |
|
|
JSON Web Token None Algorithm
JWT
This exercise covers the exploitation of a signature weakness in a JWT library.
|
< 1 Hr. | 10127 | PRO | |
|
|
Struts devMode
This exercise covers how to get code execution when a Struts application is running in devMode
|
-- | 0 | PRO | |
|
|
Intercept 01
This exercise covers how to intercept an HTTP connection.
|
1-2 Hr. | 1841 | PRO | |
|
|
Intercept 02
This exercise covers how to intercept an HTTPs connection.
|
< 1 Hr. | 1667 | PRO | |
|
|
Intercept 03
This exercise covers how to intercept an HTTPs connection with hostname verification.
|
< 1 Hr. | 1514 | PRO | |
|
|
CVE-2011-0228
This exercise covers how to intercept an HTTPs connection
|
1-2 Hr. | 1231 | PRO | |
|
|
CVE-2014-1266
This exercise covers how to intercept an HTTPs connection
|
1-2 Hr. | 1078 | PRO | |
|
|
XMLDecoder
This exercise covers the exploitation of an application using XMLDecoder
|
< 1 Hr. | 5447 | PRO |
Showing 1–30 of 699 exercises
Free Labs of the Month