Web - Server

Discover the mechanisms, protocols and technologies used on the Internet and learn to abuse it!

These challenges are designed to train users on HTML, HTTP and other server side mechanisms. The following series of challenges will cultivate a better understanding of techniques such as : Basic workings of multiple authentication mechanisms, handling form data, inner workings of web applications, etc. ...

Prerequisites:
- Understand HTML.
- Understand the HTTP protocol.
- Ability to manipulate a web browser.

Challenges associated with this section 61 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty   Difficulty Author Note  Notation Solution
pas_valide HTML - Source code 48% 75397 5 g0uZ 3
pas_valide HTTP - POST 11% 16218 15 Th1b4ud 10
pas_valide HTTP - User-agent 24% 37621 10 g0uZ 10
pas_valide Weak password 34% 53681 10 g0uZ 6
pas_valide HTTP - Open redirect 17% 25938 10 Swissky 10
pas_valide Install files 15% 22499 15 g0uZ 2
pas_valide HTTP - Improper redirect 12% 18948 15 Arod 10
pas_valide HTTP - Verb tampering 15% 22455 15 g0uZ 10
pas_valide HTTP - Headers 16% 24743 15 Arod 8
pas_valide HTTP - Directory indexing 24% 37060 15 g0uZ 4
pas_valide Backup file 17% 26888 15 g0uZ 7
pas_valide PHP - Command injection 16% 24996 10 sambecks 10
pas_valide XML External Entity 2% 2408 35 sambecks 2
pas_valide XSLT - Code execution 2% 1592 30 ghozt 5
pas_valide LDAP injection - Authentication 4% 5307 35 g0uZ 8
pas_valide NoSQL injection - Authentication 3% 3972 35 mastho 8
pas_valide PHP - Path Truncation 2% 2973 35 Geluchat 4
pas_valide PHP - Serialization 3% 3687 35 Arod 2
pas_valide SQL injection - Numeric 5% 6837 35 g0uZ 6
pas_valide SQL Injection - Routed 2% 1965 35 soka 5
pas_valide SQL Truncation 3% 3207 35 Geluchat 2
pas_valide SQL injection - Insert 1% 1410 40 sambecks 3
pas_valide XPath injection - Authentication 3% 3960 35 g0uZ 5
pas_valide Java - Spring Boot 1% 1025 40 dvor4x 2
pas_valide Local File Inclusion - Wrappers 1% 1503 40 sambecks 4
pas_valide PHP - Eval 1% 1167 40 chmod 9
pas_valide SQL injection - Error 3% 3299 40 sambecks 4
pas_valide SQL injection - Authentication - GBK 3% 4053 30 dvor4x 3
pas_valide SQL injection - File reading 2% 2557 40 Arod 2
pas_valide XPath injection - String 2% 2119 40 g0uZ 4
pas_valide NoSQL injection - Blind 1% 1385 45 ghozt 5
pas_valide SQL injection - Time based 2% 2394 45 ycam 4
pas_valide SQL injection - String 6% 8942 30 g0uZ 8
pas_valide PHP - Loose Comparison 2% 3039 30 ghozt 4
pas_valide SQL injection - Authentication 13% 19540 30 g0uZ 11
pas_valide PHP - assert() 5% 6898 25 Birdy42 8
pas_valide CRLF 10% 14510 20 g0uZ 7
pas_valide File upload - Double extensions 11% 16673 20 g0uZ 9
pas_valide File upload - MIME type 9% 12997 20 g0uZ 8
pas_valide HTTP - Cookies 14% 20840 20 g0uZ 7
pas_valide Insecure Code Management 1% 1306 20 Swissky 5
pas_valide JSON Web Token (JWT) - Introduction 2% 1895 20 Knowledge 3
pas_valide Directory traversal 11% 17368 25 g0uZ 3
pas_valide File upload - Null byte 8% 12063 25 g0uZ 4
pas_valide Remote File Inclusion 4% 5781 30 g0uZ 8
pas_valide JSON Web Token (JWT) - Weak secret 1% 1256 25 Jrmbt 4
pas_valide PHP - Filters 7% 10545 25 g0uZ 3
pas_valide PHP - register globals 6% 8815 25 g0uZ 1
pas_valide File upload - ZIP 3% 3932 30 ghozt 3
pas_valide Command injection - Filter bypass 2% 2909 30 sambecks 6
pas_valide Java - Server-side Template Injection 4% 4905 30 righettod 4
pas_valide JSON Web Token (JWT) - Public key 1% 657 30 Jrmbt 2
pas_valide Local File Inclusion 9% 13487 30 g0uZ 3
pas_valide Local File Inclusion - Double encoding 5% 6381 30 zM 3
pas_valide PHP - preg_replace() 4% 4890 30 sambecks 4
pas_valide PHP - type juggling 3% 4670 30 vic 4
pas_valide Server Side Request Forgery 1% 496 50 sambecks 3
pas_valide SQL injection - Blind 3% 3758 50 g0uZ 4
pas_valide LDAP injection - Blind 1% 1547 55 g0uZ 1
pas_valide XPath injection - Blind 1% 1030 75 g0uZ 4
pas_valide SQL injection - Filter bypass 1% 1028 80 sambecks 5

Challenge Results Challenge Results

Pseudo Challenge Lang date
Dysoonn   SQL Injection - Routed fr 14 November 2019 at 22:29
jyfg   HTML - Code source fr 14 November 2019 at 22:27
AMChat   File upload - Null byte fr 14 November 2019 at 22:25
bandera   HTTP - Open redirect en 14 November 2019 at 22:24
y51r   LDAP injection - Authentification fr 14 November 2019 at 22:23
Anıl   HTTP - Directory indexing fr 14 November 2019 at 22:22
v.martyanov   SQL injection - Time based en 14 November 2019 at 22:21
hacktus0   PHP - Injection de commande fr 14 November 2019 at 22:20
superlutin   HTTP - Open redirect fr 14 November 2019 at 22:19
Celian   SQL injection - Numérique fr 14 November 2019 at 22:14