Exercises

Exercise Avg. Time Difficulty Solved by Tier
Recon 26
In this challenge, you need to look for a key in the JavaScript used by the website
< 1 Hr. medium 4980 FREE
Recon 24
In this challenge, you need to look for a file named key.txt in the place used to serve the assets for the main website
< 1 Hr. medium 5277 FREE
Recon 22
In this challenge, you need to look in repo9 for deleted files
< 1 Hr. medium 4998 FREE
Recon 19
In this challenge, you need to look at the email addresses used for commits in the repository repo7
< 1 Hr. medium 5031 FREE
Recon 18
In this challenge, you need to look at the public repository of the developers in the organisation
< 1 Hr. medium 5348 FREE
Recon 17
In this challenge, you need to look at the name of the developer used in the repository test1
< 1 Hr. medium 5661 FREE
Recon 16
In this challenge, you need to find the version of Bind used
< 1 Hr. medium 5562 FREE
Recon 08
This exercise covers aliases in TLS certificates
< 1 Hr. medium 9370 FREE
Recon 05
This exercise covers simple directory bruteforcing
< 1 Hr. medium 12025 FREE
Recon 04
This exercise covers common interesting directories
< 1 Hr. medium 16401 FREE
Recon 01
This exercise covers 404 error pages
< 1 Hr. medium 21536 FREE
Recon 10
This exercise covers visual content discovery
< 1 Hr. medium 6610 FREE
CVE-2018-10933: LibSSH auth bypass
This exercise covers how to bypass authentication on an SSH server based on libssh to gain a shell on the affected system
-- medium 0 FREE
CVE-2014-4511: Gitlist RCE
This exercise explains how you can exploit a vulnerability published in 2014 in Gitlist.
< 1 Hr. medium 13 FREE
Padding Oracle
This exercise covers an attack against CBC mode. This attack can be used to decrypt data and re-encrypt arbitrary data
1-2 Hr. medium 849 FREE
Play XML Entities
This exercise covers the exploitation of XML entities in the Play framework
1-2 Hr. medium 2297 FREE
Play Session Injection
This exercise covers the exploitation of a session injection in the Play framework. This issue can be used to tamper with the content of the session while bypassing the signing mechanism
< 1 Hr. medium 2946 FREE
CVE-2007-1860: mod_jk double-decoding
This exercise covers the exploitation of CVE-2007-1860. This vulnerability allows an attacker to gain access to inaccessible pages using crafted requests. This is a common trick that a lot of testers miss.
1-2 Hr. medium 6176 FREE
XSS and MySQL FILE XSS
This exercise explains how to exploit a Cross-Site Scripting vulnerability to obtain an administrator's cookies, and how you can use their session to gain access to the administration panel, and find a SQL injection to gain code execution
-- medium 0 FREE
Electronic Code Book Crypto
This exercise explains how you can tamper with encrypted cookies to access another user's account
1-2 Hr. medium 5928 FREE
From SQL Injection to Shell II SQL Injection
This exercise explains how you can, from a blind SQL injection, gain access to the administration console. Then once in the administration console, how you can run commands on the system.
1-2 Hr. medium 45 FREE
Axis2 Web service and Tomcat Manager
This exercise explains the interactions between Tomcat and Apache, then it shows how to call and attack an Axis2 Web service. Using information retrieved from this attack, you will be able to gain access to the Tomcat Manager and deploy a WebShell to gain command execution.
-- medium 0 FREE
CVE-2008-1930: WordPress Cookie Integrity Flaw
This exercise explains how you can exploit CVE-2008-1930 to gain access to the administration interface of a Wordpress installation.
< 1 Hr. medium 26 FREE
From SQL Injection to Shell: PostgreSQL edition SQL Injection
This exercise explains how you can from a SQL injection gain access to the administration console, and from there, how you can run commands on the underlying system
< 1 Hr. medium 19 FREE
CVE-2012-1823: PHP CGI
This exercise explains how you can exploit CVE-2012-1823 to retrieve the source code of an application and gain code execution.
-- medium 1 FREE
PHP Include And Post Exploitation
This exercise describes the exploitation of a local file include with limited access. Once code execution is gained, you will see some post exploitation tricks.
-- medium 1 FREE
From SQL Injection to Shell SQL Injection
This exercise demonstrates how to leverage a SQL injection to gain access to the admin console, and from there, how to execute commands on the underlying system
< 1 Hr. medium 8280 FREE
Showing 1–27 of 27 exercises