Exercises
| Exercise | Avg. Time | Difficulty | Solved by | Tier | |
|---|---|---|---|---|---|
|
|
Ruby 2.x Universal RCE Deserialization Gadget Chain
This exercise covers how to get code execution by using a Ruby Universal Gadget when an attacker controls the data passed to Marshal.load()
|
< 1 Hr. | 1425 | PRO | |
|
|
Android 04
This exercise will guide you through the process of reversing a simple Android code
|
< 1 Hr. | 2548 | PRO | |
|
|
Android 03
This exercise will guide you through the process of extracting simple information from an APK
|
< 1 Hr. | 3378 | PRO | |
|
|
From SQL injection to Shell III
SQL Injection
This exercise covers how to gain access to an administration interface using SQL injection followed by how to get command execution using ImageTragick
|
1-2 Hr. | 1138 | PRO | |
|
|
IDOR to Shell
This exercise covers how to get code execution by chaining vulnerabilities in a Ruby-on-Rails application
|
1-2 Hr. | 1074 | PRO | |
|
|
Android 01
This exercise will guide you through the process of extracting simple information from an APK
|
< 1 Hr. | 3989 | PRO | |
|
|
JWT V
JWT
This exercise covers the exploitation of a trivial secret used to sign JWT tokens.
|
< 1 Hr. | 3067 | PRO | |
|
|
JWT IV
JWT
This exercise covers the exploitation of a vulnerability similar to the recent CVE-2017-17405 impacting Ruby Net::FTP
|
< 1 Hr. | 2736 | PRO | |
|
|
SAML: Introduction
This exercise covers the exploitation of a signature stripping vulnerability in SAML
|
< 1 Hr. | 2912 | PRO | |
|
|
CVE-2016-10033: PHPMailer RCE
This exercise covers a remote code execution vulnerability in PHPMailer
|
< 1 Hr. | 3801 | PRO | |
|
|
Cipher block chaining
Crypto
This exercise details how to tamper with data encrypted using CBC
|
1-2 Hr. | 2977 | PRO | |
|
|
Struts s2-045
This exercise covers a Remote Code Execution in Struts 2.
|
< 1 Hr. | 2819 | PRO | |
|
|
CVE-2016-2098
This exercise covers a remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data
|
< 1 Hr. | 3714 | PRO | |
|
|
ECDSA
Crypto
This exercise covers the exploitation of a weakness in the usage of ECDSA
|
2-4 Hr. | 362 | PRO | |
|
|
Werkzeug DEBUG
This challenge was written for Ruxcon CTF 2015 and cover the Debug mode of Werkzeug/Flask
|
< 1 Hr. | 1619 | PRO | |
|
|
Unickle
This challenge was written for Ruxcon CTF 2015. It's an SQL injection mixed with a remote code execution.
|
1-2 Hr. | 670 | PRO | |
|
|
Luhn
This challenge was written for Ruxcon CTF 2015. It's an SQL injection with a twist
|
2-4 Hr. | 627 | PRO | |
|
|
CVE-2015-3224
This exercise is a challenge written for Nullcon CTF in 2015
|
< 1 Hr. | 1632 | PRO | |
|
|
Introduction 00
This exercise will guide you through the process of scoring on an exercise to get it marked as completed
|
< 1 Hr. | 31655 | PRO | |
|
|
Introduction 03
This exercise will guide through the process of scoring an exercise to mark it as completed. However, this time, you will run commands on the underlying operating system. You will need to run the score command with your UUID.
|
< 1 Hr. | 29501 | PRO | |
|
|
Introduction 02
This exercise will guide through the process of scoring an exercise to mark it as completed. Finding the key is just a little bit harder than the previous exercise.
|
< 1 Hr. | 30188 | PRO | |
|
|
Introduction 01
This exercise will guide through the process of scoring an exercise to mark it as completed
|
< 1 Hr. | 30598 | PRO | |
|
|
CVE-2013-0156: Rails Object Injection
This exercise covers the exploitation of a code execution in Ruby-on-Rails using XML and YAML.
|
< 1 Hr. | 4022 | PRO | |
|
|
JWT Algorithm Confusion
JWT
This exercise covers the exploitation of an issue with some implementations of JWT
|
1-2 Hr. | 3845 | PRO | |
|
|
CVE-2016-0792
This exercise covers the exploitation of an Xstream vulnerability in Jenkins
|
< 1 Hr. | 4860 | PRO | |
|
|
ObjectInputStream
This exercise covers the exploitation of a call to readObject in a Spring application
|
< 1 Hr. | 4358 | PRO | |
|
|
XMLDecoder
This exercise covers the exploitation of an application using XMLDecoder
|
< 1 Hr. | 5447 | PRO | |
|
|
CVE-2014-1266
This exercise covers how to intercept an HTTPs connection
|
1-2 Hr. | 1078 | PRO | |
|
|
CVE-2011-0228
This exercise covers how to intercept an HTTPs connection
|
1-2 Hr. | 1231 | PRO | |
|
|
Intercept 03
This exercise covers how to intercept an HTTPs connection with hostname verification.
|
< 1 Hr. | 1514 | PRO |
Showing 61–90 of 97 exercises
Free Labs of the Month