Exercises

Exercise Avg. Time Difficulty Solved by Tier
OAuth2: Authorization Server OpenRedirect
This exercise covers the exploitation of an OpenRedirect in an OAuth2 Authorization Server
< 1 Hr. medium 949 PRO
SAML: Signature Stripping
This exercise covers the exploitation of a signature stripping vulnerability in SAML
< 1 Hr. medium 2056 PRO
Android 05
This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data
1-2 Hr. medium 2010 PRO
Ruby 2.x Universal RCE Deserialization Gadget Chain
This exercise covers how to get code execution by using a Ruby Universal Gadget when an attacker controls the data passed to Marshal.load()
< 1 Hr. medium 1425 PRO
Android 04
This exercise will guide you through the process of reversing a simple Android code
< 1 Hr. medium 2548 PRO
Android 03
This exercise will guide you through the process of extracting simple information from an APK
< 1 Hr. medium 3378 PRO
JWT V JWT
This exercise covers the exploitation of a trivial secret used to sign JWT tokens.
< 1 Hr. medium 3067 PRO
JWT IV JWT
This exercise covers the exploitation of a vulnerability similar to the recent CVE-2017-17405 impacting Ruby Net::FTP
< 1 Hr. medium 2736 PRO
CVE-2016-10033: PHPMailer RCE
This exercise covers a remote code execution vulnerability in PHPMailer
< 1 Hr. medium 3801 PRO
Cipher block chaining Crypto
This exercise details how to tamper with data encrypted using CBC
1-2 Hr. medium 2977 PRO
Struts s2-045
This exercise covers a Remote Code Execution in Struts 2.
< 1 Hr. medium 2819 PRO
CVE-2016-2098
This exercise covers a remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data
< 1 Hr. medium 3714 PRO
Werkzeug DEBUG
This challenge was written for Ruxcon CTF 2015 and cover the Debug mode of Werkzeug/Flask
< 1 Hr. medium 1619 PRO
CVE-2015-3224
This exercise is a challenge written for Nullcon CTF in 2015
< 1 Hr. medium 1632 PRO
CVE-2013-0156: Rails Object Injection
This exercise covers the exploitation of a code execution in Ruby-on-Rails using XML and YAML.
< 1 Hr. medium 4022 PRO
JWT Algorithm Confusion JWT
This exercise covers the exploitation of an issue with some implementations of JWT
1-2 Hr. medium 3845 PRO
CVE-2016-0792
This exercise covers the exploitation of an Xstream vulnerability in Jenkins
< 1 Hr. medium 4860 PRO
ObjectInputStream
This exercise covers the exploitation of a call to readObject in a Spring application
< 1 Hr. medium 4358 PRO
XMLDecoder
This exercise covers the exploitation of an application using XMLDecoder
< 1 Hr. medium 5447 PRO
Intercept 03
This exercise covers how to intercept an HTTPs connection with hostname verification.
< 1 Hr. medium 1514 PRO
Intercept 02
This exercise covers how to intercept an HTTPs connection.
< 1 Hr. medium 1667 PRO
Struts devMode
This exercise covers how to get code execution when a Struts application is running in devMode
-- medium 0 PRO
Cross-Origin Resource Sharing
This exercise covers Cross-Origin Resource Sharing and how it can be used to bypass CSRF protection if it's misconfigured
-- medium 0 PRO
Pickle Code Execution
This exercise covers the exploitation of Python's pickle when used to deserialize untrusted data
< 1 Hr. medium 6491 PRO
1 2
Showing 31–54 of 54 exercises