Exercises

Exercise Avg. Time Difficulty Solved by Tier
Recon 09
< 1 Hr. easy 10321 FREE
CVE-2020-8163: Rails local name RCE
This exercise details the exploitation of CVE-2020-8163 to gain code execution
1-2 Hr. hard 228 PRO
SAML: Known Key
This exercise covers the exploitation of a known key in SAML
1-2 Hr. medium 543 PRO
Code Review 09
This exercise is one of our challenges to help you learn how to review real source code
1-2 Hr. hard 406 PRO
Recon 04
This exercise covers common interesting directories
< 1 Hr. medium 16401 FREE
Recon 05
This exercise covers simple directory bruteforcing
< 1 Hr. medium 12025 FREE
Recon 01
This exercise covers 404 error pages
< 1 Hr. medium 21536 FREE
OAuth2: Client Server XSS
This exercise covers the exploitation of a Cross-Site Scripting in an OAuth2 Client and Server
1-2 Hr. hard 379 PRO
Zip symlink
This exercise covers how you can create a malicious Zip file and use it to gain access to sensitive files.
< 1 Hr. medium 597 PRO
Code Review 08
This exercise is one of our challenges to help you learn how to review real source code
1-2 Hr. easy 518 PRO
SAML: Comment Injection
This exercise covers the exploitation of a comment injection vulnerability in SAML
< 1 Hr. medium 1717 PRO
Unicode and Downcase
This exercise covers how you can use unicode to gain access to an admin account.
< 1 Hr. medium 604 PRO
Code Review 07
This exercise is one of our challenges to help you learn how to review real source code
1-2 Hr. hard 435 PRO
Recon 10
This exercise covers visual content discovery
< 1 Hr. medium 6610 FREE
Recon 00
This exercise covers the robots.txt file
< 1 Hr. easy 22076 FREE
Recon 02
This exercise covers the security.txt file
< 1 Hr. easy 18629 FREE
Recon 03
This exercise covers directory listing
< 1 Hr. easy 16697 FREE
Java Serialize 01
This exercise is one of our challenges to help you learn Java Serialisation exploitation
< 1 Hr. easy 428 PRO
Unicode and Uppercase
This exercise covers how you can use unicode to gain access to an admin account.
< 1 Hr. medium 681 PRO
Code Review 06
This exercise is one of our challenges to help you learn how to review real source code
2-4 Hr. medium 384 PRO
Cross-Site Leak
This exercise covers how to use Cross-Site Leak to recover sensitive information
2-4 Hr. hard 589 PRO
From SQL injection to Shell III: PostgreSQL Edition SQL Injection
This exercise covers how to gain access to an administration interface using a SQL injection, and how to get command execution using Ghostscript
2-4 Hr. medium 256 PRO
OAuth2: Client CSRF II
This exercise covers the exploitation of a CSRF in an OAuth2 Client
2-4 Hr. medium 497 PRO
XSS Include XSS
This exercise covers how to use Cross-Site-Scripting Include to leak information
< 1 Hr. easy 1375 PRO
OAuth2: Client CSRF
This exercise covers the exploitation of a CSRF in an OAuth2 Client
< 1 Hr. medium 972 PRO
Code Review 05
This exercise is one of our challenges to help you learn how to review real source code
2-4 Hr. hard 425 PRO
Code Review 04
This exercise is one of our challenges to help you learn how to review real source code
1-2 Hr. hard 542 PRO
JS Prototype Pollution
This exercise covers how to exploit Prototype Pollution against a JavaScript application
< 1 Hr. easy 949 PRO
OAuth2: Authorization Server CSRF
This exercise covers the exploitation of a CSRF in an OAuth2 Authorization Server
1-2 Hr. easy 1167 PRO
Code Review 03
This exercise is one of our challenges to help you learn how to review real source code
2-4 Hr. hard 466 PRO
1 13 14 15 16 17 18 19 25
Showing 451–480 of 722 exercises