Exercises

Exercise Avg. Time Difficulty Solved by Tier
Recon 09
< 1 Hr. easy 10321 FREE
CVE-2020-8163: Rails local name RCE
This exercise details the exploitation of CVE-2020-8163 to gain code execution
1-2 Hr. hard 227 PRO
SAML: Known Key
This exercise covers the exploitation of a known key in SAML
1-2 Hr. medium 530 PRO
Code Review 09
This exercise is one of our challenges to help you learn how to review real source code
1-2 Hr. hard 330 PRO
Recon 04
This exercise covers common interesting directories
< 1 Hr. medium 16401 FREE
Recon 05
This exercise covers simple directory bruteforcing
< 1 Hr. medium 12025 FREE
Recon 01
This exercise covers 404 error pages
< 1 Hr. medium 21536 FREE
OAuth2: Client Server XSS
This exercise covers the exploitation of a Cross-Site Scripting in an OAuth2 Client and Server
1-2 Hr. hard 378 PRO
Zip symlink
This exercise covers how you can create a malicious Zip file and use it to gain access to sensitive files.
< 1 Hr. medium 595 PRO
Code Review 08
This exercise is one of our challenges to help you learn how to review real source code
1-2 Hr. easy 440 PRO
SAML: Comment Injection
This exercise covers the exploitation of a comment injection vulnerability in SAML
< 1 Hr. medium 1703 PRO
Unicode and Downcase
This exercise covers how you can use unicode to gain access to an admin account.
< 1 Hr. medium 604 PRO
Code Review 07
This exercise is one of our challenges to help you learn how to review real source code
1-2 Hr. hard 358 PRO
Recon 10
This exercise covers visual content discovery
< 1 Hr. medium 6610 FREE
Recon 00
This exercise covers the robots.txt file
< 1 Hr. easy 21503 FREE
Recon 02
This exercise covers the security.txt file
< 1 Hr. easy 18124 FREE
Recon 03
This exercise covers directory listing
< 1 Hr. easy 16265 FREE
Java Serialize 01
This exercise is one of our challenges to help you learn Java Serialisation exploitation
< 1 Hr. easy 428 PRO
Unicode and Uppercase
This exercise covers how you can use unicode to gain access to an admin account.
< 1 Hr. medium 681 PRO
Code Review 06
This exercise is one of our challenges to help you learn how to review real source code
2-4 Hr. medium 329 PRO
Cross-Site Leak
This exercise covers how to use Cross-Site Leak to recover sensitive information
2-4 Hr. hard 586 PRO
From SQL injection to Shell III: PostgreSQL Edition SQL Injection
This exercise covers how to gain access to an administration interface using a SQL injection, and how to get command execution using Ghostscript
2-4 Hr. medium 251 PRO
OAuth2: Client CSRF II
This exercise covers the exploitation of a CSRF in an OAuth2 Client
2-4 Hr. medium 494 PRO
XSS Include XSS
This exercise covers how to use Cross-Site-Scripting Include to leak information
< 1 Hr. easy 1365 PRO
OAuth2: Client CSRF
This exercise covers the exploitation of a CSRF in an OAuth2 Client
< 1 Hr. medium 966 PRO
Code Review 05
This exercise is one of our challenges to help you learn how to review real source code
2-4 Hr. hard 340 PRO
Code Review 04
This exercise is one of our challenges to help you learn how to review real source code
1-2 Hr. hard 459 PRO
JS Prototype Pollution
This exercise covers how to exploit Prototype Pollution against a JavaScript application
< 1 Hr. easy 943 PRO
OAuth2: Authorization Server CSRF
This exercise covers the exploitation of a CSRF in an OAuth2 Authorization Server
1-2 Hr. easy 1159 PRO
Code Review 03
This exercise is one of our challenges to help you learn how to review real source code
2-4 Hr. hard 407 PRO
1 12 13 14 15 16 17 18 24
Showing 421–450 of 692 exercises