Web Security


CSE 365 - Spring 2023.

Exploit various web security vulnerabilities.


Exploit a path traversal vulnerability

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a command injection vulnerability

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit an authentication bypass vulnerability

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a structured query language injection vulnerability to login

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a structured query language injection vulnerability to leak data

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a structured query language injection vulnerability with an unknown database structure

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a structured query language injection vulnerability to blindly leak data

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a cross site scripting vulnerability

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a cross site scripting vulnerability with more complicated context

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a cross site scripting vulnerability to cause a user action

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a cross site request forgery vulnerability

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a cross site request forgery vulnerability where the request must POST

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a cross site scripting vulnerability to exfilitrate user session data

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a cross site scripting vulnerability to exfilitrate user data

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Exploit a (memory corruption) stack injection vulnerability

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score