Exercises
| Exercise | Avg. Time | Difficulty | Solved by | Tier | |
|---|---|---|---|---|---|
|
|
Directory Traversal 01
This exercise is one of our challenges on Directory Traversal
|
< 1 Hr. | 12357 | PRO | |
|
|
Directory Traversal 02
This exercise is one of our challenges on Directory Traversal
|
< 1 Hr. | 11974 | PRO | |
|
|
Directory Traversal 03
This exercise is one of our challenges on Directory Traversal
|
< 1 Hr. | 11823 | PRO | |
|
|
XSS 02
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 10817 | PRO | |
|
|
XSS 04
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 9912 | PRO | |
|
|
File Upload 01
This exercise is one of our challenges on Upload vulnerabilities
|
< 1 Hr. | 9465 | PRO | |
|
|
File Upload 02
This exercise is one of our challenges on Upload vulnerabilities
|
< 1 Hr. | 9336 | PRO | |
|
|
XSS 01
XSS
This exercise is one of our challenges on Cross-Site Scripting
|
< 1 Hr. | 11322 | PRO | |
|
|
File Include 02
This exercise is one of our challenges on File Include vulnerabilities
|
< 1 Hr. | 10966 | PRO | |
|
|
LDAP 01
This exercise is one of our challenges on vulnerabilities related to LDAP
|
< 1 Hr. | 10883 | PRO | |
|
|
Authentication 04
This exercise is one of our challenges on Authentication issues
|
< 1 Hr. | 18587 | PRO | |
|
|
Authentication 01
This exercise is one of our challenges on Authentication issues
|
< 1 Hr. | 20374 | PRO | |
|
|
Authentication 02
This exercise is one of our challenges on Authentication issues
|
< 1 Hr. | 19528 | PRO | |
|
|
Authentication 03
This exercise is one of our challenges on Authentication issues
|
< 1 Hr. | 18948 | PRO | |
|
|
Authorization 01
This exercise is one of our challenges on Authorisation issues
|
< 1 Hr. | 18009 | PRO | |
|
|
Authorization 02
This exercise is one of our challenges on Authorisation issues
|
< 1 Hr. | 17593 | PRO | |
|
|
Code Execution 01
This exercise is one of our challenges on Code Execution
|
< 1 Hr. | 14877 | PRO | |
|
|
Introduction 00
This exercise will guide you through the process of scoring on an exercise to get it marked as completed
|
< 1 Hr. | 31655 | PRO | |
|
|
Introduction 01
This exercise will guide through the process of scoring an exercise to mark it as completed
|
< 1 Hr. | 30598 | PRO | |
|
|
Introduction 02
This exercise will guide through the process of scoring an exercise to mark it as completed. Finding the key is just a little bit harder than the previous exercise.
|
< 1 Hr. | 30188 | PRO | |
|
|
Introduction 03
This exercise will guide through the process of scoring an exercise to mark it as completed. However, this time, you will run commands on the underlying operating system. You will need to run the score command with your UUID.
|
< 1 Hr. | 29501 | PRO | |
|
|
Intercept 01
This exercise covers how to intercept an HTTP connection.
|
1-2 Hr. | 1841 | PRO | |
|
|
JSON Web Token None Algorithm
JWT
This exercise covers the exploitation of a signature weakness in a JWT library.
|
< 1 Hr. | 10127 | PRO | |
|
|
CVE-2014-6271/Shellshock
This exercise covers the exploitation of a Bash vulnerability through a CGI.
|
< 1 Hr. | 9066 | FREE | |
|
|
Web for Pentester II
This exercise is a set of the most common web vulnerabilities.
|
-- | 0 | FREE | |
|
|
Web for Pentester
This exercise is a set of the most common web vulnerabilities.
|
-- | 0 | FREE |
Showing 241–266 of 266 exercises
Free Labs of the Month