Exploit various web security vulnerabilities.
Exploit a path traversal vulnerability
Exploit a command injection vulnerability
Exploit an authentication bypass vulnerability
Exploit a structured query language injection vulnerability to login
Exploit a structured query language injection vulnerability to leak data
Exploit a structured query language injection vulnerability with an unknown database structure
Exploit a structured query language injection vulnerability to blindly leak data
Exploit a cross site scripting vulnerability
Exploit a cross site scripting vulnerability with more complicated context
Exploit a cross site scripting vulnerability to cause a user action
Exploit a cross site request forgery vulnerability
Exploit a cross site request forgery vulnerability where the request must POST
Exploit a cross site scripting vulnerability to exfiltrate user session data
Exploit a cross site scripting vulnerability to exfiltrate user data
This scoreboard reflects solves for challenges in this module after the module launched in this dojo.
7-Day | 30-Day | All-Time