Orange Badge

The orange badge is our third set of exercises. It covers a wide range of vulnerabilities targetting other clients of the applications (XSS, CSRF, CORS...)

14

Exercises

0

Completed this badge

13

CPEs

Cross-Site Request Forgery

This exercise details the exploitation of a Cross-Site Request Forgery to gain access to sensitive data

Difficulty: EASY
  • 1 video
  • Completed by 112 students
  • Takes Less than an hour on average

JSON Cross-Site Request Forgery

This exercise details the exploitation of a Cross-Site Request Forgery when JSON is used

Difficulty: EASY
  • 1 video
  • Completed by 85 students
  • Takes Less than an hour on average

Introduction to CSP

This exercise details the exploitation of a XSS in a simple web application that uses Content Security Policy

Difficulty: EASY
  • 1 video
  • Completed by 545 students
  • Takes Less than an hour on average

TBD Coming soon

TBD

Difficulty: EASY
  • Completed by 0 student
  • Takes -- on average

SVG XSS

This exercise covers how one can use SVG to trigger a Cross-Site-Scripting.

Difficulty: EASY
  • Ruby/Rails
  • Completed by 83 students
  • Takes Less than an hour on average

Cross-Site WebSocket Hijacking

This exercise covers Cross-Site WebSocket Hijacking and how it can be used to gain access to sensitive information

Difficulty: MEDIUM
  • 2 videos
  • Ruby/Sinatra
  • Completed by 103 students
  • Takes Between 1 and 2 hours on average

postMessage()

This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information

Difficulty: MEDIUM
  • 2 videos
  • Ruby/Sinatra
  • Completed by 96 students
  • Takes Between 1 and 2 hours on average

postMessage() II

This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information when a listener does not filter the origin

Difficulty: MEDIUM
  • 2 videos
  • Ruby/Sinatra
  • Completed by 64 students
  • Takes Less than an hour on average

postMessage() III

This exercise covers how insecure calls to the JavaScript function postMessage() can be used to trigger a Cross-Site Scripting

Difficulty: MEDIUM
  • 2 videos
  • Ruby/Sinatra
  • Completed by 55 students
  • Takes Between 1 and 2 hours on average

postMessage() IV

This exercise covers how insecure calls to the JavaScript function postMessage() can be used to leak sensitive information when a listener does not filter the origin and X-Frame-Options is used

Difficulty: MEDIUM
  • 1 video
  • HTML/Javascript
  • Completed by 36 students
  • Takes Between 1 and 2 hours on average

CVE-2018-6574: go get RCE

This exercise covers a remote command execution in Golang's go get command.

Difficulty: MEDIUM
  • 1 video
  • Completed by 127 students
  • Takes Between 1 and 2 hours on average

CVE-2016-5386: HTTPoxy/Golang HTTProxy namespace conflict

This exercise covers the exploitation of HTTPoxy against an old version of Golang

Difficulty: MEDIUM
  • 2 videos
  • Completed by 180 students
  • Takes Less than an hour on average

Cross-Origin Resource Sharing II

This exercise covers Cross-Origin Resource Sharing and how it can be used to get access to sensitive data.

Difficulty: MEDIUM
  • 1 video
  • Ruby/Sinatra/Angular
  • Completed by 68 students
  • Takes Between 1 and 2 hours on average

CVE-2018-11235: Git Submodule RCE

This exercise details the exploitation of a vulnerability in Git Sub module that can be used to get command execution

Difficulty: HARD
  • Completed by 65 students
  • Takes Between 1 and 2 hours on average