Exercises

Exercise Avg. Time Difficulty Solved by Tier
HTTP 12
This challenge covers how to send specific HTTP requests
< 1 Hr. medium 3697 PRO
HTTP 13
This challenge covers how to send specific HTTP requests
< 1 Hr. medium 3613 PRO
HTTP 14
This challenge covers how to send specific HTTP requests
< 1 Hr. easy 3619 PRO
API 02 API
This exercise is the API version of an exercise you already solved in another badge. You should use it to get more confident with discovering vulnerabilities without any hint on what to look for.
< 1 Hr. easy 3010 PRO
Express Local File Read
This exercise covers how an insecure call to render can be used to gain local files read with Express
< 1 Hr. medium 415 PRO
OAuth2: Authorization Server XSS
This exercise covers the exploitation of an XSS in an OAuth2 Authorization Server
< 1 Hr. medium 386 PRO
HTTP 10
This challenge covers how to send specific HTTP requests
< 1 Hr. easy 3832 PRO
HTTP 09
This challenge covers how to send specific HTTP requests
< 1 Hr. medium 3938 PRO
HTTP 07
This challenge covers how to send specific HTTP requests
< 1 Hr. easy 4035 PRO
HTTP 06
This challenge covers how to send specific HTTP requests
< 1 Hr. easy 4124 PRO
HTTP 08
This challenge covers how to send specific HTTP requests
< 1 Hr. easy 4024 PRO
HTTP 03
This challenge covers how to send specific HTTP requests
< 1 Hr. easy 4474 PRO
HTTP 04
This challenge covers how to send specific HTTP requests
< 1 Hr. easy 4319 PRO
HTTP 05
This challenge covers how to send specific HTTP requests
< 1 Hr. easy 4236 PRO
HTTP 02
This challenge covers how to send specific HTTP requests
< 1 Hr. medium 4710 PRO
HTTP 01
This challenge covers how to send specific HTTP requests
< 1 Hr. easy 4964 PRO
API 01 API
This exercise is the API version of an exercise you already solved in the Essential Badge. You should use it to get more confident with discovering vulnerabilities without any hint on what to look for.
< 1 Hr. easy 3518 PRO
JWT Algorithm Confusion with RSA Public Key Recovery JWT
This exercise covers the exploitation of algorithm confusion when no public key is available
< 1 Hr. hard 211 PRO
SAML: Comment Injection II
This exercise covers the exploitation of a comment injection vulnerability in SAML
< 1 Hr. medium 617 PRO
Recon 24
In this challenge, you need to look for a file named key.txt in the place used to serve the assets for the main website
< 1 Hr. medium 5277 FREE
Recon 25
In this challenge, you need to look for a file named key2.txt in the place used to serve the assets for the main website
1-2 Hr. easy 3216 FREE
Recon 26
In this challenge, you need to look for a key in the JavaScript used by the website
< 1 Hr. medium 4980 FREE
SSRF via FFMPEG
This exercise covers how you can read arbitrary files when an application uses ffmpeg to render videos from a video you provide
< 1 Hr. medium 255 PRO
SAML: Signature Wrapping II
This exercise covers how to use Signature Wrapping to become an arbitrary user
< 1 Hr. hard 460 PRO
RCE via argument injection
This exercise covers a remote command execution vulnerability via argument injection
2-4 Hr. hard 57 PRO
Code Review 16
This exercise is one of our challenges to help you learn how to review real source code
< 1 Hr. easy 434 PRO
Code Review 17
This exercise is one of our challenges to help you learn how to review real source code
1-2 Hr. medium 320 PRO
SAML: Signature Wrapping
This exercise covers how to use Signature Wrapping to become an arbitrary user
< 1 Hr. hard 558 PRO
Recon 20
In this challenge, you need to look at the branches in repo3
< 1 Hr. easy 5316 FREE
Recon 21
In this challenge, you need to look at the information in the branches for repo4
< 1 Hr. easy 5194 FREE
1 10 11 12 13 14 15 16 24
Showing 361–390 of 692 exercises