Web - Server

Entdecken Sie die Protokolle und Technologien, die das Internet am laufen halten und lernen Sie diese zu hintergehen

Diese Übungen sind darauf ausgelegt einem HTML, HTTP und andere serverseitige Einrichtungen näher zu bringen. Es werden einem in Grundzügen das Innenleben eines Servers gezeigt: verschiedener Identifikationsmethoden, Auslesen von Formulardaten, usw.

Benötigte Vorkenntnisse:
- Grundkenntnisse HTML
- Grundkentnisse HTTP
- Grundkentnisse Webbrowser

In dieser Rubrik veröffentlichte Übungen 57 Übungen

Ergebnis Name der Übung Validierung Anzahl der Punkte  Erklärung der Punktevergabe Schwierigkeitsgrad  Schwierigkeitsgrad Autor Bewertung  Bewertung Musterlösung
pas_valide HTML 49% 62961 5 g0uZ 2
pas_valide HTTP - Open redirect 16% 19916 10 Swissky 1
pas_valide Command injection 16% 19503 10 sambecks 4
pas_valide Weak password 36% 46344 10 g0uZ 1
pas_valide User-agent 25% 31695 10 g0uZ 3
pas_valide Backup file 19% 23394 15 g0uZ 1
pas_valide HTTP - POST 9% 11042 15 Th1b4ud 1
pas_valide HTTP directory indexing 25% 31744 15 g0uZ 1
pas_valide HTTP Headers 17% 20987 15 Arod 1
pas_valide HTTP verb tampering 15% 19462 15 g0uZ 1
pas_valide Install files 16% 19616 15 g0uZ 1
pas_valide Improper redirect 13% 15805 15 Arod 1
pas_valide CRLF 10% 12343 20 g0uZ 1
pas_valide File upload - double extensions 12% 14400 20 g0uZ 1
pas_valide File upload - MIME type 9% 11058 20 g0uZ 2
pas_valide HTTP cookies 14% 17693 20 g0uZ 1
pas_valide Directory traversal 12% 14943 25 g0uZ 1
pas_valide File upload - null byte 9% 10403 25 g0uZ 1
pas_valide PHP assert() 5% 5689 25 Birdy42 1
pas_valide PHP filters 8% 9201 25 g0uZ 1
pas_valide PHP register globals 6% 7639 25 g0uZ 1
pas_valide File upload - ZIP 3% 3104 30 ghozt 0
pas_valide Command injection - Filter bypass 2% 2251 30 sambecks 0
pas_valide Local File Inclusion 10% 11775 30 g0uZ 0
pas_valide Local File Inclusion - Double encoding 5% 5513 30 zM 1
pas_valide PHP - Loose Comparison 2% 2339 30 ghozt 0
pas_valide PHP preg_replace() 4% 4216 30 sambecks 0
pas_valide PHP type juggling 4% 4053 30 vic 0
pas_valide Remote File Inclusion 4% 5067 30 g0uZ 2
pas_valide Server-side Template Injection 4% 4173 30 righettod 0
pas_valide SQL injection - authentication 14% 16910 30 g0uZ 2
pas_valide SQL injection - authentication - GBK 3% 3403 30 dvor4x 0
pas_valide SQL injection - string 6% 7776 30 g0uZ 1
pas_valide XSLT - Code execution 1% 1241 30 ghozt 1
pas_valide LDAP injection - authentication 4% 4722 35 g0uZ 1
pas_valide NoSQL injection - authentication 3% 3416 35 mastho 0
pas_valide Path Truncation 2% 2524 35 Geluchat 0
pas_valide PHP Serialization 3% 3246 35 Arod 0
pas_valide SQL injection - numeric 5% 6071 35 g0uZ 0
pas_valide SQL Injection - Routed 2% 1558 35 soka 0
pas_valide SQL Truncation 3% 2771 35 Geluchat 0
pas_valide XML External Entity 2% 2026 35 sambecks 0
pas_valide XPath injection - authentication 3% 3575 35 g0uZ 0
pas_valide Java - Spring Boot 1% 818 40 dvor4x 0
pas_valide Local File Inclusion - Wrappers 1% 1243 40 sambecks 0
pas_valide PHP - Eval 1% 769 40 chmod 0
pas_valide SQL injection - Error 3% 2804 40 sambecks 0
pas_valide SQL injection - Insert 1% 1184 40 sambecks 0
pas_valide SQL injection - file reading 2% 2223 40 Arod 0
pas_valide XPath injection - string 2% 1862 40 g0uZ 0
pas_valide NoSQL injection - blind 1% 1131 45 ghozt 0
pas_valide SQL injection - Time based 2% 2083 45 ycam 0
pas_valide Server Side Request Forgery 1% 331 50 sambecks 0
pas_valide SQL injection - blind 3% 3374 50 g0uZ 0
pas_valide LDAP injection - blind 2% 1364 55 g0uZ 0
pas_valide XPath injection - blind 1% 880 75 g0uZ 0
pas_valide SQL injection - filter bypass 1% 834 80 sambecks 0

Ergebnisse der Übungen Ergebnisse der Übungen

Nickname Übungen Sprache date
shenhai   Weak password en 22. April 2019 zu  05:16
shenhai   HTTP - Open redirect en 22. April 2019 zu  05:01
shenhai   Command injection en 22. April 2019 zu  04:48
Whatallouf   PHP assert() fr 22. April 2019 zu  04:36
Kenshi '/   File upload - null byte fr 22. April 2019 zu  04:30
Kenshi '/   Directory traversal fr 22. April 2019 zu  04:29
Kenshi '/   File upload - type MIME fr 22. April 2019 zu  04:27
Kenshi '/   File upload - double extensions fr 22. April 2019 zu  04:26
Kenshi '/   CRLF fr 22. April 2019 zu  04:26
Kenshi '/   Redirection invalide fr 22. April 2019 zu  04:25