Web - Server

Discover the mechanisms, protocols and technologies used on the Internet and learn to abuse it!

These challenges are designed to train users on HTML, HTTP and other server side mechanisms. The following series of challenges will cultivate a better understanding of techniques such as : Basic workings of multiple authentication mechanisms, handling form data, inner workings of web applications, etc. ...

Prerequisites:
- Understand HTML.
- Understand the HTTP protocol.
- Ability to manipulate a web browser.

Challenges associated with this section 61 Challenges

Results Challenge's Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide HTTP - Improper redirect 12% 18898 15 Arod 10
pas_valide PHP - Serialization 3% 3680 35 Arod 2
pas_valide SQL injection - File reading 2% 2549 40 Arod 2
pas_valide HTTP - Headers 16% 24673 15 Arod 8
pas_valide PHP - assert() 5% 6881 25 Birdy42 8
pas_valide PHP - Path Truncation 2% 2968 35 Geluchat 4
pas_valide SQL Truncation 3% 3204 35 Geluchat 2
pas_valide JSON Web Token (JWT) - Weak secret 1% 1231 25 Jrmbt 4
pas_valide JSON Web Token (JWT) - Public key 1% 640 30 Jrmbt 2
pas_valide JSON Web Token (JWT) - Introduction 2% 1853 20 Knowledge 3
pas_valide Insecure Code Management 1% 1257 20 Swissky 5
pas_valide HTTP - Open redirect 17% 25821 10 Swissky 10
pas_valide HTTP - POST 11% 16137 15 Th1b4ud 10
pas_valide PHP - Eval 1% 1163 40 chmod 9
pas_valide SQL injection - Authentication - GBK 3% 4037 30 dvor4x 3
pas_valide Java - Spring Boot 1% 1016 40 dvor4x 2
pas_valide SQL injection - String 6% 8928 30 g0uZ 8
pas_valide SQL injection - Blind 3% 3749 50 g0uZ 4
pas_valide Remote File Inclusion 4% 5770 30 g0uZ 8
pas_valide XPath injection - String 2% 2117 40 g0uZ 4
pas_valide LDAP injection - Authentication 4% 5295 35 g0uZ 8
pas_valide XPath injection - Authentication 3% 3953 35 g0uZ 5
pas_valide Local File Inclusion 9% 13459 30 g0uZ 3
pas_valide SQL injection - Authentication 13% 19488 30 g0uZ 11
pas_valide HTML - Source code 48% 75139 5 g0uZ 3
pas_valide LDAP injection - Blind 1% 1542 55 g0uZ 1
pas_valide Install files 15% 22451 15 g0uZ 2
pas_valide HTTP - User-agent 24% 37500 10 g0uZ 10
pas_valide Weak password 34% 53520 10 g0uZ 6
pas_valide XPath injection - Blind 1% 1029 75 g0uZ 4
pas_valide Backup file 18% 26826 15 g0uZ 7
pas_valide HTTP - Directory indexing 24% 36959 15 g0uZ 4
pas_valide HTTP - Verb tampering 15% 22415 15 g0uZ 10
pas_valide CRLF 10% 14481 20 g0uZ 7
pas_valide File upload - Double extensions 11% 16643 20 g0uZ 9
pas_valide File upload - MIME type 9% 12968 20 g0uZ 8
pas_valide HTTP - Cookies 14% 20798 20 g0uZ 7
pas_valide Directory traversal 11% 17334 25 g0uZ 3
pas_valide File upload - Null byte 8% 12039 25 g0uZ 4
pas_valide PHP - Filters 7% 10522 25 g0uZ 3
pas_valide PHP - register globals 6% 8793 25 g0uZ 1
pas_valide SQL injection - Numeric 5% 6822 35 g0uZ 6
pas_valide NoSQL injection - Blind 1% 1384 45 ghozt 5
pas_valide PHP - Loose Comparison 2% 3029 30 ghozt 4
pas_valide XSLT - Code execution 2% 1583 30 ghozt 5
pas_valide File upload - ZIP 3% 3911 30 ghozt 3
pas_valide NoSQL injection - Authentication 3% 3958 35 mastho 8
pas_valide Java - Server-side Template Injection 4% 4897 30 righettod 4
pas_valide SQL injection - Filter bypass 1% 1024 80 sambecks 5
pas_valide PHP - Command injection 16% 24874 10 sambecks 10
pas_valide Command injection - Filter bypass 2% 2902 30 sambecks 6
pas_valide Server Side Request Forgery 1% 494 50 sambecks 3
pas_valide PHP - preg_replace() 4% 4879 30 sambecks 4
pas_valide XML External Entity 2% 2404 35 sambecks 2
pas_valide SQL injection - Insert 1% 1408 40 sambecks 3
pas_valide SQL injection - Error 3% 3291 40 sambecks 4
pas_valide Local File Inclusion - Wrappers 1% 1501 40 sambecks 4
pas_valide SQL Injection - Routed 2% 1959 35 soka 5
pas_valide PHP - type juggling 3% 4656 30 vic 4
pas_valide SQL injection - Time based 2% 2389 45 ycam 4
pas_valide Local File Inclusion - Double encoding 5% 6368 30 zM 3

Challenge Results Challenge Results

Pseudo Challenge Lang date
dughie   HTTP - Verb tampering en 12 November 2019 at 07:52
dughie   HTTP - User-agent en 12 November 2019 at 07:43
dughie   HTTP - Open redirect en 12 November 2019 at 07:24
Neha   HTTP - Cookies en 12 November 2019 at 07:15
dughie   PHP - Command injection en 12 November 2019 at 07:06
Bangalot   HTML - Source code en 12 November 2019 at 07:04
Neha   HTTP - Verb tampering en 12 November 2019 at 07:01
hulk   Weak password en 12 November 2019 at 06:57
Neha   HTTP - Headers en 12 November 2019 at 06:52
random   HTML - Source code en 12 November 2019 at 06:48