Web - Server

Discover the mechanisms, protocols and technologies used on the Internet and learn to abuse it!

These challenges are designed to train users on HTML, HTTP and other server side mechanisms. The following series of challenges will cultivate a better understanding of techniques such as : Basic workings of multiple authentication mechanisms, handling form data, inner workings of web applications, etc. ...

Prerequisites:
- Understand HTML.
- Understand the HTTP protocol.
- Ability to manipulate a web browser.

 64 Challenges

Results Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide JWT - Revoked token 1% 613 25 ArnC 6
pas_valide PHP - Serialization 3% 4228 35 Arod 2
pas_valide HTTP - Headers 16% 29496 15 Arod 9
pas_valide SQL injection - File reading 2% 3068 40 Arod 3
pas_valide HTTP - Improper redirect 13% 22917 15 Arod 10
pas_valide PHP - assert() 5% 8301 25 Birdy42 9
pas_valide PHP - Path Truncation 2% 3487 35 Geluchat 4
pas_valide SQL Truncation 3% 3779 35 Geluchat 2
pas_valide JSON Web Token (JWT) - Public key 1% 1341 30 Jrmbt 4
pas_valide JSON Web Token (JWT) - Weak secret 2% 3144 25 Jrmbt 5
pas_valide JSON Web Token (JWT) - Introduction 3% 4597 20 Knowledge 4
pas_valide HTTP - Open redirect 18% 33233 10 Swissky 10
pas_valide Insecure Code Management 3% 4061 20 Swissky 6
pas_valide HTTP - POST 12% 22134 15 Th1b4ud 10
pas_valide PHP - Eval 1% 1621 40 chmod 9
pas_valide Java - Spring Boot 1% 1337 40 dvor4x 2
pas_valide SQL injection - Authentication - GBK 3% 5084 30 dvor4x 3
pas_valide SQL injection - String 6% 10721 30 g0uZ 8
pas_valide SQL injection - Authentication 13% 23211 30 g0uZ 11
pas_valide XPath injection - String 2% 2504 40 g0uZ 5
pas_valide XPath injection - Authentication 3% 4440 35 g0uZ 6
pas_valide Remote File Inclusion 4% 6757 30 g0uZ 8
pas_valide LDAP injection - Authentication 4% 6112 35 g0uZ 8
pas_valide HTTP - User-agent 25% 44959 10 g0uZ 10
pas_valide Local File Inclusion 9% 15528 30 g0uZ 4
pas_valide HTTP - Directory indexing 24% 43537 15 g0uZ 7
pas_valide LDAP injection - Blind 1% 1855 55 g0uZ 1
pas_valide HTML - Source code 49% 90249 5 g0uZ 3
pas_valide HTTP - Cookies 14% 24665 20 g0uZ 7
pas_valide XPath injection - Blind 1% 1273 75 g0uZ 4
pas_valide HTTP - Verb tampering 15% 26217 15 g0uZ 10
pas_valide Install files 15% 26132 15 g0uZ 2
pas_valide CRLF 10% 17343 20 g0uZ 7
pas_valide File upload - Double extensions 11% 19733 20 g0uZ 9
pas_valide File upload - MIME type 9% 15431 20 g0uZ 9
pas_valide Directory traversal 11% 20231 25 g0uZ 3
pas_valide SQL injection - Blind 3% 4282 50 g0uZ 5
pas_valide File upload - Null byte 8% 14035 25 g0uZ 4
pas_valide Weak password 34% 62476 10 g0uZ 7
pas_valide SQL injection - Numeric 5% 7938 35 g0uZ 6
pas_valide PHP - Filters 7% 12236 25 g0uZ 3
pas_valide PHP - register globals 6% 10153 25 g0uZ 1
pas_valide Backup file 17% 31392 15 g0uZ 7
pas_valide NoSQL injection - Blind 1% 1717 45 ghozt 5
pas_valide PHP - Loose Comparison 3% 3923 30 ghozt 4
pas_valide XSLT - Code execution 2% 1981 30 ghozt 5
pas_valide File upload - ZIP 3% 4992 30 ghozt 3
pas_valide NoSQL injection - Authentication 3% 4648 35 mastho 8
pas_valide PHP - Remote Xdebug 1% 284 25 mayfly 2
pas_valide PHP - Unserialize overflow 1% 165 40 mayfly 2
pas_valide Java - Server-side Template Injection 4% 5842 30 righettod 4
pas_valide SQL injection - Filter bypass 1% 1296 80 sambecks 5
pas_valide PHP - Command injection 18% 31777 10 sambecks 10
pas_valide Server Side Request Forgery 1% 684 50 sambecks 5
pas_valide Command injection - Filter bypass 3% 3738 30 sambecks 6
pas_valide SQL injection - Insert 1% 1668 40 sambecks 3
pas_valide SQL injection - Error 3% 3998 40 sambecks 4
pas_valide PHP - preg_replace() 4% 5722 30 sambecks 4
pas_valide Local File Inclusion - Wrappers 2% 1862 40 sambecks 4
pas_valide XML External Entity 2% 2881 35 sambecks 2
pas_valide SQL Injection - Routed 2% 2487 35 soka 5
pas_valide PHP - type juggling 3% 5551 30 vic 4
pas_valide SQL injection - Time based 2% 2909 45 ycam 4
pas_valide Local File Inclusion - Double encoding 5% 7539 30 zM_ 3

Challenge Results Challenge Results

Pseudo Challenge Lang date
0xh3inh737   Weak password 10 July 2020 at 11:06
0xh3inh737   HTTP - User-agent 10 July 2020 at 11:06
Weekz   Fichier de sauvegarde 10 July 2020 at 11:06
b3nji3guy   HTTP - Verb tampering 10 July 2020 at 11:04
0xh3inh737   HTTP - Open redirect 10 July 2020 at 11:04
Axel   Fichier de sauvegarde 10 July 2020 at 11:04
hieule   PHP - Command injection 10 July 2020 at 10:57
b3nji3guy   HTTP - Improper redirect 10 July 2020 at 10:55
Salamandre55   JSON Web Token (JWT) - Public key 10 July 2020 at 10:54
0xh3inh737   HTML - Source code 10 July 2020 at 10:54