Login
Register
Introduction 00 (next)
Course
Videos
Scoring
Introduction Badge
Introduction Badge (next)
Badges
Introduction Badge
Unix Badge
Essential Badge
PCAP badge
White Badge
Serialize Badge
Yellow Badge
Blue Badge
Green Badge
Orange Badge
Intercept Badge
Authentication / Authorization Badge
Android Badge
Capture-The-Flag Badge
Brown Badge
Recon Badge
API Badge
Code Review Badge
Java Serialize Badge
Login
Register
Blue Badge
754
Completed
11
Exercises
Easy
S2-052
This exercise covers the exploitation of the Struts S2-052 vulnerability
1 video
Completed by 1334 students
Takes Less than an hour on average
Java/Struts
Easy
JWT VII
This exercise covers the exploitation of a website using JWT for session without verifying the signature
2 videos
Completed by 1606 students
Takes Less than an hour on average
Easy
Git Information Leak
This exercise details how to retrieve information from an exposed .git directory on a web server
1 video
Completed by 1743 students
Takes Less than an hour on average
Easy
JWT V
This exercise covers the exploitation of a trivial secret used to sign JWT tokens.
4 videos
Completed by 1513 students
Takes Less than an hour on average
Easy
Git Information Leak II
This exercise details how to retrieve information from an exposed .git directory on a web server. This time, the directly listing is disabled
1 video
Completed by 1281 students
Takes Less than an hour on average
Medium
JWT III
This exercise covers the exploitation of an issue in the usage of JWT token
3 videos
Completed by 1427 students
Takes Between 1 and 2 hours on average
Medium
JWT IV
This exercise covers the exploitation of a vulnerability similar to the recent CVE-2017-17405 impacting Ruby Net::FTP
3 videos
Completed by 1336 students
Takes Less than an hour on average
Medium
JWT VI
This exercise covers the exploitation of an injection in the kid element of a JWT. This injection can be used to bypass the signature mechanism
3 videos
Completed by 1248 students
Takes Less than an hour on average
Medium
CBC-MAC II
This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV
1 video
Completed by 862 students
Takes Between 1 and 2 hours on average
Hard
CBC-MAC
This exercise covers the exploitation of signature of non-fixed size messages with CBC-MAC
2 videos
Completed by 848 students
Takes Between 2 and 4 hours on average
Hard
CVE-2018-0114
This exercise details the exploitation of a vulnerability in Cisco's node-jose, a JavaScript library created to manage JWT
3 videos
Completed by 921 students
Takes Between 2 and 4 hours on average