PentesterLab
  • Login
  • Register
  • Introduction 00 (next)
    • Course
    • Videos
    • Scoring
    • Introduction Badge
  • Introduction Badge (next)
  • Badges
    • Introduction Badge
    • Unix Badge
    • Essential Badge
    • PCAP badge
    • White Badge
    • Serialize Badge
    • Yellow Badge
    • Blue Badge
    • Green Badge
    • Orange Badge
    • Intercept Badge
    • Authentication / Authorization Badge
    • Android Badge
    • Capture-The-Flag Badge
    • Brown Badge
    • Recon Badge
    • API Badge
    • Code Review Badge
    • Java Serialize Badge
  • Login
  • Register

Capture-The-Flag Badge

253 Completed
6 Exercises
Easy image for CVE-2015-3224

CVE-2015-3224

  • This exercise is a challenge written for Nullcon CTF in 2015
  • Completed by 1092 students
  • Takes Less than an hour on average
  • Rails
Easy image for Werkzeug DEBUG

Werkzeug DEBUG

  • This challenge was written for Ruxcon CTF 2015 and cover the Debug mode of Werkzeug/Flask
  • Completed by 1069 students
  • Takes Less than an hour on average
  • Python
Medium image for Padding Oracle

Padding Oracle

  • This exercise covers an attack against CBC mode. This attack can be used to decrypt data and re-encrypt arbitrary data
  • Completed by 635 students
  • Takes Between 1 and 2 hours on average
  • PHP
Hard image for Luhn

Luhn

  • This challenge was written for Ruxcon CTF 2015. It's an SQL injection with a twist
  • Completed by 458 students
  • Takes Between 2 and 4 hours on average
  • Python
Hard image for Unickle

Unickle

  • This challenge was written for Ruxcon CTF 2015. It's an SQL injection mixed with a remote code execution.
  • Completed by 510 students
  • Takes Between 1 and 2 hours on average
  • Python
Hard image for ECDSA

ECDSA

  • This exercise covers the exploitation of a weakness in the usage of ECDSA
  • Completed by 269 students
  • Takes Between 2 and 4 hours on average
  • PHP/Apache/Mysql
  • Support
  • Privacy
  • Terms of Service

© 2020 - PentesterLab