Web Security


Intro to Cybersecurity

Exploit various web security vulnerabilities.


Lectures and Reading


Challenges

Exploit a path traversal vulnerability

Exploit a command injection vulnerability

Exploit an authentication bypass vulnerability

Exploit a structured query language injection vulnerability to login

Exploit a structured query language injection vulnerability to leak data

Exploit a structured query language injection vulnerability with an unknown database structure

Exploit a structured query language injection vulnerability to blindly leak data

Exploit a cross site scripting vulnerability

Exploit a cross site scripting vulnerability with more complicated context

Exploit a cross site scripting vulnerability to cause a user action

Exploit a cross site request forgery vulnerability

Exploit a cross site request forgery vulnerability where the request must POST

Exploit a cross site scripting vulnerability to exfilitrate user session data

Exploit a cross site scripting vulnerability to exfilitrate user data

Exploit a (memory corruption) stack injection vulnerability


Module Ranking

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score