Exercises

Exercise Avg. Time Difficulty Solved by Tier
MongoDB Injection 02
This exercise is one of our challenges on vulnerabilities related to MongoDB
1-2 Hr. hard 8628 PRO
ECDSA Crypto
This exercise covers the exploitation of a weakness in the usage of ECDSA
2-4 Hr. hard 362 PRO
Unickle
This challenge was written for Ruxcon CTF 2015. It's an SQL injection mixed with a remote code execution.
1-2 Hr. hard 670 PRO
Luhn
This challenge was written for Ruxcon CTF 2015. It's an SQL injection with a twist
2-4 Hr. hard 627 PRO
CVE-2014-1266
This exercise covers how to intercept an HTTPs connection
1-2 Hr. hard 1078 PRO
CVE-2011-0228
This exercise covers how to intercept an HTTPs connection
1-2 Hr. hard 1231 PRO
API to Shell API
This exercise covers the exploitation of PHP type confusion to bypass a signature and the exploitation of unserialize.
2-4 Hr. hard 3513 PRO
CVE-2012-6081: MoinMoin code execution
This exercise explains how you can exploit CVE-2012-6081 to gain code execution. This vulnerability was exploited to compromise Debian's wiki and Python documentation website
-- hard 0 FREE
Rack Cookies and Commands injection
After a short brute force introduction, this exercise explains the tampering of rack cookies and how you can even manage to modify a signed cookie (if the secret is trivial). Using this issue, you will be able to escalate your privileges and gain command execution
-- hard 1 FREE
Linux Host Review
This exercise explains how to perform a Linux host review, what and how you can check the configuration of a Linux server to ensure it is securely configured. The reviewed system is a traditional Linux-Apache-Mysql-PHP (LAMP) server used to host a blog.
-- hard 1 FREE
CVE-2012-2661: ActiveRecord SQL injection
This exercise explains how you can exploit CVE-2012-2661 to retrieve information from a database
-- hard 0 FREE
1 2 3
Showing 61–71 of 71 exercises