Exercises

Exercise Avg. Time Difficulty Solved by Tier
Ruby 2.x Universal RCE Deserialization Gadget Chain
This exercise covers how to get code execution by using a Ruby Universal Gadget when an attacker controls the data passed to Marshal.load()
< 1 Hr. medium 1425 PRO
Android 04
This exercise will guide you through the process of reversing a simple Android code
< 1 Hr. medium 2548 PRO
Android 03
This exercise will guide you through the process of extracting simple information from an APK
< 1 Hr. medium 3378 PRO
From SQL injection to Shell III SQL Injection
This exercise covers how to gain access to an administration interface using SQL injection followed by how to get command execution using ImageTragick
1-2 Hr. hard 1138 PRO
IDOR to Shell
This exercise covers how to get code execution by chaining vulnerabilities in a Ruby-on-Rails application
1-2 Hr. hard 1074 PRO
Android 01
This exercise will guide you through the process of extracting simple information from an APK
< 1 Hr. easy 3989 PRO
JWT V JWT
This exercise covers the exploitation of a trivial secret used to sign JWT tokens.
< 1 Hr. medium 3067 PRO
JWT IV JWT
This exercise covers the exploitation of a vulnerability similar to the recent CVE-2017-17405 impacting Ruby Net::FTP
< 1 Hr. medium 2736 PRO
SAML: Introduction
This exercise covers the exploitation of a signature stripping vulnerability in SAML
< 1 Hr. easy 2912 PRO
CVE-2016-10033: PHPMailer RCE
This exercise covers a remote code execution vulnerability in PHPMailer
< 1 Hr. medium 3801 PRO
Cipher block chaining Crypto
This exercise details how to tamper with data encrypted using CBC
1-2 Hr. medium 2977 PRO
Struts s2-045
This exercise covers a Remote Code Execution in Struts 2.
< 1 Hr. medium 2819 PRO
CVE-2016-2098
This exercise covers a remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data
< 1 Hr. medium 3714 PRO
ECDSA Crypto
This exercise covers the exploitation of a weakness in the usage of ECDSA
2-4 Hr. hard 362 PRO
Werkzeug DEBUG
This challenge was written for Ruxcon CTF 2015 and cover the Debug mode of Werkzeug/Flask
< 1 Hr. medium 1619 PRO
Unickle
This challenge was written for Ruxcon CTF 2015. It's an SQL injection mixed with a remote code execution.
1-2 Hr. hard 670 PRO
Luhn
This challenge was written for Ruxcon CTF 2015. It's an SQL injection with a twist
2-4 Hr. hard 627 PRO
CVE-2015-3224
This exercise is a challenge written for Nullcon CTF in 2015
< 1 Hr. medium 1632 PRO
Introduction 00
This exercise will guide you through the process of scoring on an exercise to get it marked as completed
< 1 Hr. easy 31655 PRO
Introduction 03
This exercise will guide through the process of scoring an exercise to mark it as completed. However, this time, you will run commands on the underlying operating system. You will need to run the score command with your UUID.
< 1 Hr. easy 29501 PRO
Introduction 02
This exercise will guide through the process of scoring an exercise to mark it as completed. Finding the key is just a little bit harder than the previous exercise.
< 1 Hr. easy 30188 PRO
Introduction 01
This exercise will guide through the process of scoring an exercise to mark it as completed
< 1 Hr. easy 30598 PRO
CVE-2013-0156: Rails Object Injection
This exercise covers the exploitation of a code execution in Ruby-on-Rails using XML and YAML.
< 1 Hr. medium 4022 PRO
JWT Algorithm Confusion JWT
This exercise covers the exploitation of an issue with some implementations of JWT
1-2 Hr. medium 3845 PRO
CVE-2016-0792
This exercise covers the exploitation of an Xstream vulnerability in Jenkins
< 1 Hr. medium 4860 PRO
ObjectInputStream
This exercise covers the exploitation of a call to readObject in a Spring application
< 1 Hr. medium 4358 PRO
XMLDecoder
This exercise covers the exploitation of an application using XMLDecoder
< 1 Hr. medium 5447 PRO
CVE-2014-1266
This exercise covers how to intercept an HTTPs connection
1-2 Hr. hard 1078 PRO
CVE-2011-0228
This exercise covers how to intercept an HTTPs connection
1-2 Hr. hard 1231 PRO
Intercept 03
This exercise covers how to intercept an HTTPs connection with hostname verification.
< 1 Hr. medium 1514 PRO
1 2 3 4
Showing 61–90 of 97 exercises