|
Exploit Tech: Return to Library
Learn the principles and methods of attack techniques used for bypassing canaries and exploiting code in libraries.
|
2,305 people
|
90 minutes
|
Easy
|
FREE
|
|
Exploit Tech: Meet-in-the-middle Attack
Learn how the meet-in-the-middle attack works.
|
733 people
|
60 minutes
|
Very easy
|
FREE
|
|
FAT32 and NTFS File Systems
FAT32 and NTFS file systems
|
218 people
|
60 minutes
|
Easy
|
FREE
|
|
Background: Binary
Describes what a binary is and the compilation process.
|
8,785 people
|
30 minutes
|
Very easy
|
FREE
|
|
Exploit Tech: Length Eextension Attack
Learn how to compute another hash value from one hash value using a length extension attack on the MD5 hash function.
|
109 people
|
60 minutes
|
Easy
|
FREE
|
|
Exploit Tech: Format String Bug
Practice format string attacks using example code with format string bug vulnerability.
|
1,559 people
|
60 minutes
|
Easy
|
FREE
|
|
Exploit Tech: _IO_FILE Arbitrary Address Write
Learn an exploit that uses _IO_FILE to write a value to an arbitrary memory address.
|
498 people
|
90 minutes
|
Difficult
|
FREE
|
|
Number Theory 2
You will study Fermat's little theorem, Euler's theorem, and practice with soem integer classes in SageMath.
|
299 people
|
60 minutes
|
Easy
|
FREE
|
|
Web Hacking 101
Learn Web Hacking 101.
|
2,852 people
|
30 minutes
|
Very easy
|
FREE
|
|
Firmware analysis
Learn firmware analysis.
|
105 people
|
60 minutes
|
Medium
|
PAID
|
|
Registry
Windows registry
|
132 people
|
60 minutes
|
Easy
|
FREE
|
|
Docker
Learn Docker.
|
2,448 people
|
120 minutes
|
Easy
|
FREE
|
|
KAPE
Learn how to use KAPE
|
41 people
|
90 minutes
|
Medium
|
FREE
|
|
Object Structure - WASM, Function
Learn the structure of WASMs and functions.
|
77 people
|
60 minutes
|
Very Difficult
|
PAID
|
|
Background: React
Learn the essentials of React.
|
|
60 minutes
|
Very easy
|
ENTERPRISE
|
|
Electronics/Electrical
Describes electronics/electricity.
|
40 people
|
30 minutes
|
Easy
|
PAID
|
|
string
Learn how to identify and fix string input validation issues.
|
|
90 minutes
|
Difficult
|
ENTERPRISE
|
|
URL validation
Learn how to validate and patch weak URLs.
|
|
120 minutes
|
Difficult
|
ENTERPRISE
|
|
Practice Together: Firmware Emulation Practice
Work through the Firmware Emulation Exercise together.
|
75 people
|
90 minutes
|
Medium
|
PAID
|
|
[WHA-C] Background: Content Security Policy
Describes the Content Security Policy.
|
1,017 people
|
30 minutes
|
Medium
|
FREE
|
|
Netcat
Learn Netcat.
|
2,763 people
|
30 minutes
|
Very easy
|
FREE
|
|
Blockchain and smart contracts
Understand what blockchain and smart contracts are.
|
|
30 minutes
|
Easy
|
ENTERPRISE
|
|
Numbers
Learn how to identify and fix numeric input validation issues.
|
|
120 minutes
|
Difficult
|
ENTERPRISE
|
|
Exploit Tech: Storage Collision
Read the Solidity code to find and exploit a storage conflict vulnerability in the proxy contract.
|
|
60 minutes
|
Easy
|
ENTERPRISE
|
|
[WHA-C] Exploit Tech: Relative Path Overwrite
Learn the principles and methods of Relative Path Overwrite.
|
285 people
|
30 minutes
|
Medium
|
FREE
|
|
Header
Learn the goals and organization of the C Secure Coding Roadmap.
|
|
5 minutes
|
Very easy
|
ENTERPRISE
|
|
Numeric Errors
Learn about bugs that can occur with numeric operations in Solidity contracts.
|
|
30 minutes
|
Easy
|
ENTERPRISE
|
|
Using safe libraries
Learn precautions to use the library safely.
|
|
120 minutes
|
Difficult
|
ENTERPRISE
|
|
Exploit Tech: Initializer & Selfdestruct
Read the Solidity code to find a vulnerability in the Initializer and attack it via selfdestruct.
|
|
60 minutes
|
Easy
|
ENTERPRISE
|
|
Unreliable data sources
Learn how to identify and fix issues with using data from untrusted sources.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
Proxy Contracts
Learn what a proxy contract is in Smart Contracts.
|
|
30 minutes
|
Easy
|
ENTERPRISE
|
|
Syntax and characteristics of Solidity
Learn about Solidity, the leading language for writing smart contracts on Ethereum.
|
|
60 minutes
|
Medium
|
ENTERPRISE
|
|
Sender
Learn the characteristics of keywords related to sender used in Solidity contracts and the vulnerabilities associated with them.
|
|
30 minutes
|
Easy
|
ENTERPRISE
|
|
[WHA-S] Exercise: Command Injection Advanced
Solve Command Injection Advanced challenges together.
|
879 people
|
60 minutes
|
Easy
|
FREE
|
|
Use secure JWTs
Identify issues you may encounter when using JWTs and how to fix them.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
Hard-coded sensitive information
Learn the types of sensitive information that are hard-coded.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
IDOR
Learn about vulnerable cases where IDOR occurs and how to patch them.
|
|
60 minutes
|
Difficult
|
ENTERPRISE
|
|
Lack of Rate Limiting
Learn the need for rate limits.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
[WHA-S] Exercise: Bypass WAF
Let's unpack Bypass WAF together.
|
1,116 people
|
60 minutes
|
Easy
|
FREE
|
|
Exposing sensitive information
Learn examples of sensitive information exposure.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
Using Lock securely
Learn how to safely use Locks in the Kotlin environment.
|
|
60 minutes
|
Difficult
|
ENTERPRISE
|
|
[WHA-S] Exploit Tech: DBMS Misconfiguration
Learn the vulnerabilities that can be caused by DBMS misconfiguration.
|
972 people
|
60 minutes
|
Medium
|
FREE
|
|
Password-related
Learn password-related vulnerabilities and how to patch them.
|
|
30 minutes
|
Difficult
|
ENTERPRISE
|
|
[WHA-S] ExploitTech: Error & Time based SQL Injection
Learn Error based SQL Injection and Time based SQL Injection.
|
1,677 people
|
60 minutes
|
Medium
|
FREE
|
|
[WHA-S] ExploitTech: Blind SQL Injection Advanced
Learn the principles and methods of attacks that are more efficient than traditional Blind SQL Injection.
|
1,765 people
|
30 minutes
|
Medium
|
FREE
|
|
[WHA-C] Exploit Tech: XS-Search
Learn the principles and methods of XS-Search.
|
617 people
|
30 minutes
|
Medium
|
FREE
|
|
[WHA-S] Exercise: Blind SQL Injection Advanced
Let's walk through Blind SQL Injection Advanced together.
|
1,530 people
|
90 minutes
|
Easy
|
FREE
|
|
Client-side vulnerabilities
Learn about XSS and CSRF.
|
|
60 minutes
|
Very easy
|
ENTERPRISE
|
|
[WHA-S] ExploitTech: DBMS Fingerprinting
Learn the principles and methods of DBMS-specific information gathering.
|
1,030 people
|
30 minutes
|
Medium
|
FREE
|
|
[WHA-S] Exercise: CouchDB
Let's unpack NoSQL-CouchDB together.
|
773 people
|
60 minutes
|
Easy
|
FREE
|