Brown Badge

24 Videos
24 Exercises
Easy image for Signing Oracle

Signing Oracle

  • This exercise covers how a signing oracle can be used to bypass authorization in place
  • 2 videos
  • Completed by 457 students
  • Takes Less than an hour on average
Easy image for JS Prototype Pollution

JS Prototype Pollution

  • This exercise covers how to exploit Prototype Pollution against a JavaScript application
  • 1 video
  • Completed by 444 students
  • Takes Less than an hour on average
Easy image for CVE-2021-41773

CVE-2021-41773

  • This challenge covers how to read arbitrary files by leveraging CVE-2021-41773
  • Completed by 52 students
  • Takes Less than an hour on average
  • Apache
Easy image for JSON Web Encryption

JSON Web Encryption

  • This exercise covers how you can create your own JWE if you have access to the public key used by the se rver
  • 2 videos
  • Completed by 279 students
  • Takes Less than an hour on average
Easy image for Apache Pluto RCE

Apache Pluto RCE

  • This exercise covers how you can gain code execution in Apache Pluto 3.0.0 due to an issue in the authorisation logic
  • 1 video
  • Completed by 285 students
  • Takes Less than an hour on average
Easy image for Unicode and Uppercase

Unicode and Uppercase

  • This exercise covers how you can use unicode to gain access to an admin account.
  • 1 video
  • Completed by 344 students
  • Takes Less than an hour on average
Easy image for Unicode and Downcase

Unicode and Downcase

  • This exercise covers how you can use unicode to gain access to an admin account.
  • 1 video
  • Completed by 297 students
  • Takes Less than an hour on average
Easy image for Zip symlink

Zip symlink

  • This exercise covers how you can create a malicious Zip file and use it to gain access to sensitive files.
  • 1 video
  • Completed by 276 students
  • Takes Less than an hour on average
Easy image for CVE-2020-14343: PyYAML unsafe loader

CVE-2020-14343: PyYAML unsafe loader

  • This exercise covers how you can gain code execution when an application use a vulnerable version of PyYAML and relies on load()
  • Completed by 97 students
  • Takes Less than an hour on average
Easy image for Express Local File Read

Express Local File Read

  • This exercise covers how an insecure to render can be used to gain local file read with Express
  • Completed by 71 students
  • Takes Less than an hour on average
Easy image for CVE-2021-40438

CVE-2021-40438

  • This challenge covers how to trigger a Server-Side Request Forgery by leveraging CVE-2021-40438
  • Completed by 11 students
  • Takes Less than an hour on average
  • Apache
Medium image for PHP phar://

PHP phar://

  • This exercise covers how the PHP phar:// handler can be used to gain code execution using PHP unserialize.
  • 1 video
  • Completed by 187 students
  • Takes Less than an hour on average
Medium image for Spring Actuators

Spring Actuators

  • This exercise covers how you can gain code execution using Spring Actuators when Spring Cloud is used.
  • 1 video
  • Completed by 141 students
  • Takes Between 1 and 2 hours on average
Medium image for From SQL injection to Shell III: PostgreSQL Edition

From SQL injection to Shell III: PostgreSQL Edition

  • This exercise covers how to gain access to an administration interface using SQL injection followed by how to get command execution using Ghostscript
  • Completed by 80 students
  • Takes Between 2 and 4 hours on average
  • Ruby-on-Rails
  • SQL Injection
Medium image for Unicode and NFKC

Unicode and NFKC

  • This exercise covers how can leverage unicode to get exploit a directory traversal
  • Completed by 108 students
  • Takes Less than an hour on average
Medium image for EDDSA vulnerability in Monocypher

EDDSA vulnerability in Monocypher

  • This exercise covers the exploitation of a vulnerability impacting Monocypher.
  • Completed by 36 students
  • Takes Between 1 and 2 hours on average
  • crypto
Medium image for CGI and Signature

CGI and Signature

  • This exercise covers the exploitation of a vulnerable CGI.
  • 1 video
  • Completed by 53 students
  • Takes Less than an hour on average
Medium image for CVE-2020-7115: Aruba Clearpass RCE

CVE-2020-7115: Aruba Clearpass RCE

  • This exercise covers a remote command execution issue on Aruba Clearpass RCE
  • 1 video
  • Completed by 64 students
  • Takes Between 1 and 2 hours on average
Medium image for CVE-2021-41773 II

CVE-2021-41773 II

  • This challenge covers how to gain code execution by leveraging CVE-2021-41773
  • Completed by 8 students
  • Takes Less than an hour on average
  • Apache
Hard image for CVE-2020-8163: Rails local name RCE

CVE-2020-8163: Rails local name RCE

  • This exercise details the exploitation of CVE-2020-8163 to gain code execution
  • 2 videos
  • Completed by 93 students
  • Takes Between 2 and 4 hours on average
Hard image for RCE via argument injection

RCE via argument injection

  • This exercise covers a remote command execution vulnerability in which an attacker can only inject arguments
  • Completed by 11 students
  • Takes More than 4 hours on average
Hard image for Ox Remote Code Execution

Ox Remote Code Execution

  • This exercise covers how you can gain code execution when an application using Ox to deserialize data and run on Ruby 2.3
  • Completed by 4 students
  • Takes More than 4 hours on average
  • Ruby
Hard image for JSON Web Token XIII

JSON Web Token XIII

  • This exercise covers the exploitation of algorithm confusion when no public key is available
  • Completed by 40 students
  • Takes Less than an hour on average
  • PHP
  • jwt
Coming soon
Hard image for Ox Remote Code Execution II

Ox Remote Code Execution II

  • This exercise covers how you can gain code execution when an application using Ox to deserialize data and run on Ruby 2.7
  • Takes -- on average
  • Ruby