Realistic challenges.

You will end up in environments full of diverse and varied themes. These challenges will help you understand the operation, including authentication methods, and target vulnerabilities to exploit target in realistic scenarios.

The challenges are complete web sites with multiple security vulnerabilities, with a completely fictional content. You play the role of a hacker contacted by organizations or individuals in order to provide justice through a hack. Once received your goals, it’s up to you to browse the site by trying to discover and exploit vulnerabilities. This series of challenges can be directly applied to the real world.

Challenge Results Challenge Results

Pseudo Challenge Lang date
l37'5 h4ck   Crypto Secure fr 26 April 2018 at 20:08
Xarkes   Starbug Bounty en 26 April 2018 at 18:40
Talo   Root-We en 26 April 2018 at 18:27
Talo   Marabout en 26 April 2018 at 17:38
Adams Pierre   Eh oui, parfois fr 26 April 2018 at 17:22
dbrndjb   Marabout fr 26 April 2018 at 15:52
ivan   Red Pills fr 26 April 2018 at 14:46
Thartiflète   The h@ckers l4b fr 26 April 2018 at 14:45
Grimonpont   Eh oui, parfois fr 26 April 2018 at 13:50
themsamus   Eh oui, parfois fr 26 April 2018 at 13:43