Over two hundred hacking challenges available to train yourself.
You have to be authenticated on this portal to access challenges : you just have to be authenticated on this site with the same IP address you use to play.
These challenges will help you to understand scripting vulnerabilities related to weak environment or configuration and (...)
Networks challenges where you have to deal with captured traffic, network services, packet analysis, (...)
Whereas cryptography concern the art of secret, steganography is the art of hidding: the object of steganography is to (...)
At first you will be faced with problems that will require little to no knowledge of web scripting language. Pretty soon (...)