Web - Server

Discover the mechanisms, protocols and technologies used on the Internet and learn to abuse it!

These challenges are designed to train users on HTML, HTTP and other server side mechanisms. The following series of challenges will cultivate a better understanding of techniques such as : Basic workings of multiple authentication mechanisms, handling form data, inner workings of web applications, etc. ...

Prerequisites:
- Understand HTML.
- Understand the HTTP protocol.
- Ability to manipulate a web browser.

Challenges associated with this section 48 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide HTML 52% 26205 5 g0uZ 1
pas_valide Weak password 43% 21878 10 g0uZ 2
pas_valide User-agent 27% 13616 10 g0uZ 12
pas_valide Backup file 21% 10533 15 g0uZ 5
pas_valide HTTP directory indexing 29% 14390 15 g0uZ 4
pas_valide HTTP Headers 17% 8336 15 Arod 6
pas_valide HTTP verb tampering 17% 8414 15 g0uZ 12
pas_valide Install files 18% 9010 15 g0uZ 2
pas_valide Improper redirect 13% 6405 15 Arod 11
pas_valide CRLF 10% 5126 20 g0uZ 2
pas_valide File upload - double extensions 13% 6437 20 g0uZ 4
pas_valide File upload - MIME type 10% 4970 20 g0uZ 6
pas_valide HTTP cookies 16% 8009 20 g0uZ 5
pas_valide Directory traversal 13% 6616 25 g0uZ 2
pas_valide File upload - null byte 10% 4707 25 g0uZ 4
pas_valide PHP assert() 3% 1118 25 Birdy42 8
pas_valide PHP filters 9% 4396 25 g0uZ 4
pas_valide PHP register globals 7% 3375 25 g0uZ 2
pas_valide Local File Inclusion 11% 5542 30 g0uZ 1
pas_valide Local File Inclusion - Double encoding 4% 2008 30 zM 2
pas_valide PHP preg_replace() 4% 1645 30 sambecks 8
pas_valide PHP type juggling 4% 1765 30 vic511 6
pas_valide Remote File Inclusion 5% 2295 30 g0uZ 12
pas_valide Server-side Template Injection 4% 1675 30 righettod 4
pas_valide SQL injection - authentication 16% 7922 30 g0uZ 10
pas_valide SQL injection - authentication - GBK 2% 938 30 dvor4x 7
pas_valide SQL injection - string 8% 3790 30 g0uZ 6
pas_valide LDAP injection - authentication 5% 2442 35 g0uZ 4
pas_valide NoSQL injection - authentication 3% 1526 35 mastho 6
pas_valide Path Truncation 3% 1045 35 Geluchat 3
pas_valide PHP Serialization 4% 1744 35 Arod 3
pas_valide SQL injection - numeric 7% 3087 35 g0uZ 3
pas_valide SQL Injection - Routed 1% 320 35 soka 3
pas_valide SQL Truncation 3% 1294 35 Geluchat 1
pas_valide XML External Entity 2% 841 35 sambecks 1
pas_valide XPath injection - authentication 4% 1832 35 g0uZ 7
pas_valide Java - Spring Boot 1% 215 40 dvor4x 5
pas_valide Local File Inclusion - Wrappers 1% 469 40 sambecks 4
pas_valide SQL injection - Error 3% 1161 40 sambecks 6
pas_valide SQL injection - Insert 2% 565 40 sambecks 7
pas_valide SQL injection - file reading 2% 958 40 Arod 5
pas_valide XPath injection - string 3% 1032 40 g0uZ 8
pas_valide NoSQL injection - blind 1% 338 45 ghozt 9
pas_valide SQL injection - Time based 2% 779 45 ycam 3
pas_valide SQL injection - blind 4% 2035 50 g0uZ 9
pas_valide LDAP injection - blind 2% 727 55 g0uZ 9
pas_valide XPath injection - blind 1% 398 75 g0uZ 3
pas_valide SQL injection - filter bypass 1% 378 80 sambecks 4

Challenge Results Challenge Results

Pseudo Challenge Lang date
Dr.Draco   HTML en 25 April 2017 at 19:32
doumx   HTML en 25 April 2017 at 19:23
Gotgot   Mot de passe faible fr 25 April 2017 at 19:15
drace   Local File Inclusion - Double encoding fr 25 April 2017 at 19:13
nikello   HTML en 25 April 2017 at 19:13
nikello   HTTP directory indexing en 25 April 2017 at 19:11
Core-i9   Local File Inclusion en 25 April 2017 at 19:09
nikello   SQL injection - authentication en 25 April 2017 at 18:57
Karim Samsa   HTTP Headers en 25 April 2017 at 18:56
h4stoor   HTTP cookies en 25 April 2017 at 18:52