Exercises

Exercise Avg. Time Difficulty Solved by Tier
SAML: Comment Injection
This exercise covers the exploitation of a comment injection vulnerability in SAML
< 1 Hr. medium 1703 PRO
From SQL injection to Shell III: PostgreSQL Edition SQL Injection
This exercise covers how to gain access to an administration interface using a SQL injection, and how to get command execution using Ghostscript
2-4 Hr. medium 251 PRO
OAuth2: Client CSRF II
This exercise covers the exploitation of a CSRF in an OAuth2 Client
2-4 Hr. medium 494 PRO
XSS Include XSS
This exercise covers how to use Cross-Site-Scripting Include to leak information
< 1 Hr. easy 1365 PRO
OAuth2: Client CSRF
This exercise covers the exploitation of a CSRF in an OAuth2 Client
< 1 Hr. medium 966 PRO
OAuth2: Authorization Server CSRF
This exercise covers the exploitation of a CSRF in an OAuth2 Authorization Server
1-2 Hr. easy 1159 PRO
OAuth2: Github HTTP HEAD
This exercise covers the exploitation of the HTTP HEAD issue impacting Github in 2019
< 1 Hr. hard 463 PRO
SVG XSS
This exercise covers how to use an SVG to trigger a Cross-Site-Scripting
< 1 Hr. medium 1827 PRO
postMessage() IV
This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information when a listener does not filter the Origin and X-Frame-Options is used
< 1 Hr. medium 981 PRO
postMessage() III
This exercise covers how insecure calls to the JavaScript function postMessage() can be used to trigger a Cross-Site Scripting
< 1 Hr. medium 996 PRO
postMessage() II
This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information when a listener does not filter the Origin
< 1 Hr. medium 1104 PRO
postMessage()
This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information
< 1 Hr. medium 1260 PRO
Cross-Site WebSocket Hijacking
This exercise covers Cross-Site WebSocket Hijacking and how it can be used to gain access to sensitive information
< 1 Hr. medium 1108 PRO
JWT XII JWT
This exercise covers how to use the x5u header to bypass an authentication based on JWT.
1-2 Hr. hard 696 PRO
Cross-Origin Resource Sharing II
This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.
< 1 Hr. medium 1048 PRO
JWT XI JWT
This exercise covers how to use the jku header to bypass an authentication based on JWT.
1-2 Hr. hard 690 PRO
OAuth2: Client OpenRedirect
This exercise covers the exploitation of an OpenRedirect in an OAuth2 Client
< 1 Hr. medium 839 PRO
JWT X JWT
This exercise covers how to use the jku header to bypass an authentication based on JWT.
< 1 Hr. hard 784 PRO
GraphQL: SQL Injection
This exercise covers how to use introspection and a SQL injection to get access to additional information in GraphQL.
1-2 Hr. medium 1479 PRO
OAuth2: Authorization Server OpenRedirect
This exercise covers the exploitation of an OpenRedirect in an OAuth2 Authorization Server
< 1 Hr. medium 949 PRO
JWT IX JWT
This exercise covers how to use the jku header to bypass an authentication based on JWT.
< 1 Hr. hard 910 PRO
Gogs RCE II
This exercise covers how to get code execution against the Git self hosted tool: Gogs.
< 1 Hr. hard 609 PRO
JWT VIII JWT
This exercise covers how to use the jku header to bypass an authentication based on JWT.
1-2 Hr. hard 987 PRO
SAML: Signature Stripping
This exercise covers the exploitation of a signature stripping vulnerability in SAML
< 1 Hr. medium 2056 PRO
GraphQL Introspection
This exercise covers how to use introspection to get access to additional information in GraphQL.
< 1 Hr. easy 2419 PRO
Gogs RCE
This exercise covers how to get code execution against the Git self hosted tool: Gogs.
1-2 Hr. hard 681 PRO
Android 07
This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data
1-2 Hr. hard 1468 PRO
Android 08
This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data
1-2 Hr. hard 1392 PRO
Android 06
This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data
< 1 Hr. hard 1711 PRO
Android 05
This exercise will guide you through the process of reversing a simple obfuscated Android code to recover the encrypted data
1-2 Hr. medium 2010 PRO
1 2 3 4
Showing 31–60 of 97 exercises