Exercises

Exercise Avg. Time Difficulty Solved by Tier
Latex: --shell-escape
This exercise covers how one can leverage latex when pdflatex is used with the --shell-escape option to gain command execution.
< 1 Hr. medium 21 PRO
CVE-2022-24720
This exercise covers how one can leverage image processing in ActiveStorage to gain command execution.
1-2 Hr. medium 15 PRO
CVE-2024-47081 < 1 Hr. medium 21 PRO
UUIDv1 IDOR 1-2 Hr. medium 170 PRO
API Mass-Assignment 03 < 1 Hr. medium 368 PRO
API Mass-Assignment 02 < 1 Hr. medium 400 PRO
API Mass-Assignment 01 < 1 Hr. medium 425 PRO
Mongo IDOR III < 1 Hr. medium 200 PRO
API 18
This exercise covers how to exploit an authorization issue in an API.
< 1 Hr. medium 497 PRO
API 19
This exercise covers how to exploit an authorization issue in an API.
< 1 Hr. medium 486 PRO
API 20
This exercise covers how to exploit an authorization issue in an API.
< 1 Hr. medium 466 PRO
API 16
This exercise covers how to exploit an authorization issue in an API.
< 1 Hr. medium 438 PRO
API 17
This exercise covers how to exploit an authorization issue in an API.
< 1 Hr. medium 408 PRO
ORM LEAK: SQLite
This exercise covers how to exploit an ORM leak vulnerability
1-2 Hr. medium 121 PRO
ORM LEAK 02
This exercise covers how to exploit an ORM leak vulnerability
< 1 Hr. medium 192 PRO
ORM LEAK 01
This exercise covers how to exploit a simple ORM leak.
1-2 Hr. medium 232 PRO
API 14
This exercise covers how to exploit a leaked encrypted password with an API.
< 1 Hr. medium 656 PRO
API 11
This exercise covers a common filter bypass in API.
< 1 Hr. medium 675 PRO
API 12
This exercise covers a common filter bypass in API.
< 1 Hr. medium 639 PRO
API 10
This exercise covers a common filter bypass in API.
< 1 Hr. medium 739 PRO
API 09
This exercise covers how one can inspect HTTP responses to identify information leaks.
< 1 Hr. medium 875 PRO
Java Serialize 05
This exercise is one of our challenges to help you learn Java Serialisation exploitation
2-4 Hr. medium 63 PRO
Java Serialize 04
This exercise is one of our challenges to help you learn Java Serialisation exploitation
1-2 Hr. medium 100 PRO
Cache Poisoning 01
This exercise details how to exploit an application vulnerable to cache poisoning
< 1 Hr. medium 127 PRO
Cache Deception 02
This exercise details how to exploit an application vulnerable to cache deception
< 1 Hr. medium 125 PRO
CVE-2022-XX910
This challenge covers the review of a CVE in a Java codebase and its patch
< 1 Hr. medium 128 PRO
Cache Deception 01
This exercise details how to exploit an application vulnerable to cache deception
< 1 Hr. medium 151 PRO
Java Serialize 03
This exercise is one of our challenges to help you learn Java Serialisation exploitation
< 1 Hr. medium 141 PRO
Java Serialize 02
This exercise is one of our challenges to help you learn Java Serialisation exploitation
< 1 Hr. medium 170 PRO
CVE-2022-X41X9
This challenge covers the review of a CVE in a Java codebase and its patch
< 1 Hr. medium 138 PRO
1 2 3 4 9
Showing 1–30 of 250 exercises