|
Exploit Tech: Return to Library
Learn the principles and methods of attack techniques used for bypassing canaries and exploiting code in libraries.
|
2,288
|
90 minutes
|
Easy
|
FREE
|
|
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
|
712
|
60 minutes
|
Very easy
|
FREE
|
|
FAT32 and NTFS File Systems
FAT32 and NTFS file systems
|
209
|
60 minutes
|
Easy
|
FREE
|
|
Background: Binary
Describes what a binary is and the compilation process.
|
8,731
|
30 minutes
|
Very easy
|
FREE
|
|
Exploit Tech: Length Eextension Attack
Learn how to compute another hash value from one hash value using a length extension attack on the MD5 hash function.
|
104
|
60 minutes
|
Easy
|
FREE
|
|
Exploit Tech: Format String Bug
Practice format string attacks using example code with format string bug vulnerability.
|
1,549
|
60 minutes
|
Easy
|
FREE
|
|
Exploit Tech: _IO_FILE Arbitrary Address Write
Learn an exploit that uses _IO_FILE to write a value to an arbitrary memory address.
|
490
|
90 minutes
|
Difficult
|
FREE
|
|
Firmware analysis
Learn firmware analysis.
|
104
|
60 minutes
|
Normal
|
PAID
|
|
Registry
Windows registry
|
127
|
60 minutes
|
Easy
|
FREE
|
|
Docker
Learn Docker.
|
2,409
|
120 minutes
|
Easy
|
FREE
|
|
KAPE
Learn how to use KAPE
|
39
|
90 minutes
|
Normal
|
FREE
|
|
Object Structure - WASM, Function
Learn the structure of WASMs and functions.
|
77
|
60 minutes
|
Very Difficult
|
PAID
|
|
Background: React
Learn the essentials of React.
|
|
60 minutes
|
Very easy
|
ENTERPRISE
|
|
Electronics/Electrical
Describes electronics/electricity.
|
39
|
30 minutes
|
Easy
|
PAID
|
|
string
Learn how to identify and fix string input validation issues.
|
|
90 minutes
|
Difficult
|
ENTERPRISE
|
|
URL validation
Learn how to validate and patch weak URLs.
|
|
120 minutes
|
Difficult
|
ENTERPRISE
|
|
Practice Together: Firmware Emulation Practice
Work through the Firmware Emulation Exercise together.
|
74
|
90 minutes
|
Normal
|
PAID
|
|
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
|
1,005
|
30 minutes
|
Normal
|
FREE
|
|
Netcat
Learn Netcat.
|
2,726
|
30 minutes
|
Very easy
|
FREE
|
|
Blockchain and smart contracts
Understand what blockchain and smart contracts are.
|
|
30 minutes
|
Easy
|
ENTERPRISE
|
|
Numbers
Learn how to identify and fix numeric input validation issues.
|
|
120 minutes
|
Difficult
|
ENTERPRISE
|
|
Exploit Tech: Storage Collision
Read the Solidity code to find and exploit a storage conflict vulnerability in the proxy contract.
|
|
60 minutes
|
Easy
|
ENTERPRISE
|
|
[WHA-C] Exploit Tech: Relative Path Overwrite
Learn the principles and methods of Relative Path Overwrite.
|
277
|
30 minutes
|
Normal
|
FREE
|
|
Header
Learn the goals and organization of the C Secure Coding Roadmap.
|
|
5 minutes
|
Very easy
|
ENTERPRISE
|
|
Numeric Errors
Learn about bugs that can occur with numeric operations in Solidity contracts.
|
|
30 minutes
|
Easy
|
ENTERPRISE
|
|
Using safe libraries
Learn precautions to use the library safely.
|
|
120 minutes
|
Difficult
|
ENTERPRISE
|
|
Exploit Tech: Initializer & Selfdestruct
Read the Solidity code to find a vulnerability in the Initializer and attack it via selfdestruct.
|
|
60 minutes
|
Easy
|
ENTERPRISE
|
|
Unreliable data sources
Learn how to identify and fix issues with using data from untrusted sources.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
Proxy Contracts
Learn what a proxy contract is in Smart Contracts.
|
|
30 minutes
|
Easy
|
ENTERPRISE
|
|
Syntax and characteristics of Solidity
Learn about Solidity, the leading language for writing smart contracts on Ethereum.
|
|
60 minutes
|
Normal
|
ENTERPRISE
|
|
Sender
Learn the characteristics of keywords related to sender used in Solidity contracts and the vulnerabilities associated with them.
|
|
30 minutes
|
Easy
|
ENTERPRISE
|
|
[WHA-S] Exercise: Command Injection Advanced
Solve Command Injection Advanced challenges together.
|
872
|
60 minutes
|
Easy
|
FREE
|
|
Use secure JWTs
Identify issues you may encounter when using JWTs and how to fix them.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
Hard-coded sensitive information
Learn the types of sensitive information that are hard-coded.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
IDOR
Learn about vulnerable cases where IDOR occurs and how to patch them.
|
|
60 minutes
|
Difficult
|
ENTERPRISE
|
|
Lack of Rate Limiting
Learn the need for rate limits.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
[WHA-S] Exercise: Bypass WAF
Let's unpack Bypass WAF together.
|
1,110
|
60 minutes
|
Easy
|
FREE
|
|
Exposing sensitive information
Learn examples of sensitive information exposure.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
Using Lock securely
Learn how to safely use Locks in the Kotlin environment.
|
|
60 minutes
|
Difficult
|
ENTERPRISE
|
|
[WHA-S] Exploit Tech: DBMS Misconfiguration
Learn the vulnerabilities that can be caused by DBMS misconfiguration.
|
969
|
60 minutes
|
Normal
|
FREE
|
|
Password-related
Learn password-related vulnerabilities and how to patch them.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
[WHA-S] ExploitTech: Error & Time based SQL Injection
Learn Error based SQL Injection and Time based SQL Injection.
|
1,669
|
60 minutes
|
Normal
|
FREE
|
|
[WHA-S] ExploitTech: Blind SQL Injection Advanced
Learn the principles and methods of attacks that are more efficient than traditional Blind SQL Injection.
|
1,755
|
30 minutes
|
Normal
|
FREE
|
|
[WHA-C] Exploit Tech: XS-Search
Learn the principles and methods of XS-Search.
|
609
|
30 minutes
|
Normal
|
FREE
|
|
[WHA-S] Exercise: Blind SQL Injection Advanced
Let's walk through Blind SQL Injection Advanced together.
|
1,522
|
90 minutes
|
Easy
|
FREE
|
|
Client-side vulnerabilities
Learn about XSS and CSRF.
|
|
60 minutes
|
Very easy
|
ENTERPRISE
|
|
[WHA-S] ExploitTech: DBMS Fingerprinting
Learn the principles and methods of DBMS-specific information gathering.
|
1,027
|
30 minutes
|
Normal
|
FREE
|
|
[WHA-S] Exercise: CouchDB
Let's unpack NoSQL-CouchDB together.
|
770
|
60 minutes
|
Easy
|
FREE
|
|
[WHA-S] ExploitTech: Command Injection for Linux
Learn the principles and methods of command injection in Linux.
|
737
|
60 minutes
|
Normal
|
FREE
|
|
CORS
Learn the correct CORS settings.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|