Exercises

Exercise Avg. Time Difficulty Solved by Tier
CVE-2016-0792
This exercise covers the exploitation of an Xstream vulnerability in Jenkins
< 1 Hr. medium 4860 PRO
ObjectInputStream
This exercise covers the exploitation of a call to readObject in a Spring application
< 1 Hr. medium 4358 PRO
XMLDecoder
This exercise covers the exploitation of an application using XMLDecoder
< 1 Hr. medium 5447 PRO
CVE-2014-1266
This exercise covers how to intercept an HTTPs connection
1-2 Hr. hard 1078 PRO
CVE-2011-0228
This exercise covers how to intercept an HTTPs connection
1-2 Hr. hard 1231 PRO
Intercept 03
This exercise covers how to intercept an HTTPs connection with hostname verification.
< 1 Hr. medium 1514 PRO
Intercept 02
This exercise covers how to intercept an HTTPs connection.
< 1 Hr. medium 1667 PRO
Intercept 01
This exercise covers how to intercept an HTTP connection.
1-2 Hr. easy 1841 PRO
Struts devMode
This exercise covers how to get code execution when a Struts application is running in devMode
-- medium 0 PRO
JSON Web Token None Algorithm JWT
This exercise covers the exploitation of a signature weakness in a JWT library.
< 1 Hr. easy 10127 PRO
Cross-Origin Resource Sharing
This exercise covers Cross-Origin Resource Sharing and how it can be used to bypass CSRF protection if it's misconfigured
-- medium 0 PRO
API to Shell API
This exercise covers the exploitation of PHP type confusion to bypass a signature and the exploitation of unserialize.
2-4 Hr. hard 3513 PRO
Pickle Code Execution
This exercise covers the exploitation of Python's pickle when used to deserialize untrusted data
< 1 Hr. medium 6491 PRO
Play XML Entities
This exercise covers the exploitation of XML entities in the Play framework
1-2 Hr. medium 2297 FREE
CVE-2014-6271/Shellshock
This exercise covers the exploitation of a Bash vulnerability through a CGI.
< 1 Hr. easy 9066 FREE
Play Session Injection
This exercise covers the exploitation of a session injection in the Play framework. This issue can be used to tamper with the content of the session while bypassing the signing mechanism
< 1 Hr. medium 2946 FREE
CVE-2007-1860: mod_jk double-decoding
This exercise covers the exploitation of CVE-2007-1860. This vulnerability allows an attacker to gain access to inaccessible pages using crafted requests. This is a common trick that a lot of testers miss.
1-2 Hr. medium 6176 FREE
XSS and MySQL FILE XSS
This exercise explains how to exploit a Cross-Site Scripting vulnerability to obtain an administrator's cookies, and how you can use their session to gain access to the administration panel, and find a SQL injection to gain code execution
-- medium 0 FREE
Electronic Code Book Crypto
This exercise explains how you can tamper with encrypted cookies to access another user's account
1-2 Hr. medium 5928 FREE
Web for Pentester II
This exercise is a set of the most common web vulnerabilities.
-- easy 0 FREE
From SQL Injection to Shell II SQL Injection
This exercise explains how you can, from a blind SQL injection, gain access to the administration console. Then once in the administration console, how you can run commands on the system.
1-2 Hr. medium 45 FREE
CVE-2012-6081: MoinMoin code execution
This exercise explains how you can exploit CVE-2012-6081 to gain code execution. This vulnerability was exploited to compromise Debian's wiki and Python documentation website
-- hard 0 FREE
Web for Pentester
This exercise is a set of the most common web vulnerabilities.
-- easy 0 FREE
Axis2 Web service and Tomcat Manager
This exercise explains the interactions between Tomcat and Apache, then it shows how to call and attack an Axis2 Web service. Using information retrieved from this attack, you will be able to gain access to the Tomcat Manager and deploy a WebShell to gain command execution.
-- medium 0 FREE
CVE-2008-1930: WordPress Cookie Integrity Flaw
This exercise explains how you can exploit CVE-2008-1930 to gain access to the administration interface of a Wordpress installation.
< 1 Hr. medium 26 FREE
From SQL Injection to Shell: PostgreSQL edition SQL Injection
This exercise explains how you can from a SQL injection gain access to the administration console, and from there, how you can run commands on the underlying system
< 1 Hr. medium 19 FREE
Rack Cookies and Commands injection
After a short brute force introduction, this exercise explains the tampering of rack cookies and how you can even manage to modify a signed cookie (if the secret is trivial). Using this issue, you will be able to escalate your privileges and gain command execution
-- hard 1 FREE
Linux Host Review
This exercise explains how to perform a Linux host review, what and how you can check the configuration of a Linux server to ensure it is securely configured. The reviewed system is a traditional Linux-Apache-Mysql-PHP (LAMP) server used to host a blog.
-- hard 1 FREE
CVE-2012-2661: ActiveRecord SQL injection
This exercise explains how you can exploit CVE-2012-2661 to retrieve information from a database
-- hard 0 FREE
CVE-2012-1823: PHP CGI
This exercise explains how you can exploit CVE-2012-1823 to retrieve the source code of an application and gain code execution.
-- medium 1 FREE
1 20 21 22 23 24
Showing 661–690 of 692 exercises