Web - Server

Discover the mechanisms, protocols and technologies used on the Internet and learn to abuse it!

These challenges are designed to train users on HTML, HTTP and other server side mechanisms. The following series of challenges will cultivate a better understanding of techniques such as : Basic workings of multiple authentication mechanisms, handling form data, inner workings of web applications, etc. ...

Prerequisites:
- Understand HTML.
- Understand the HTTP protocol.
- Ability to manipulate a web browser.

 63 Challenges

Results Name Validations Number of points  Explanation for the scores Difficulty  Difficulty Author Note  Notation Solution
pas_valide JWT - Revoked token 1% 148 25 ArnC 1
pas_valide LDAP injection - Blind 1% 1752 55 g0uZ 1
pas_valide PHP - register globals 6% 9655 25 g0uZ 1
pas_valide PHP - Remote Xdebug 1% 116 25 mayfly 1
pas_valide JSON Web Token (JWT) - Public key 1% 1135 30 Jrmbt 2
pas_valide Install files 15% 24802 15 g0uZ 2
pas_valide PHP - Serialization 3% 4012 35 Arod 2
pas_valide SQL Truncation 3% 3568 35 Geluchat 2
pas_valide XML External Entity 2% 2724 35 sambecks 2
pas_valide Java - Spring Boot 1% 1261 40 dvor4x 2
pas_valide Directory traversal 11% 19180 25 g0uZ 3
pas_valide SQL injection - Authentication - GBK 3% 4780 30 dvor4x 3
pas_valide File upload - ZIP 3% 4599 30 ghozt 3
pas_valide SQL injection - Insert 1% 1585 40 sambecks 3
pas_valide SQL injection - File reading 2% 2892 40 Arod 3
pas_valide PHP - Filters 7% 11607 25 g0uZ 3
pas_valide HTML - Source code 49% 84816 5 g0uZ 3
pas_valide Local File Inclusion - Double encoding 5% 7112 30 zM 3
pas_valide JSON Web Token (JWT) - Introduction 3% 3702 20 Knowledge 4
pas_valide Local File Inclusion - Wrappers 1% 1739 40 sambecks 4
pas_valide PHP - Path Truncation 2% 3310 35 Geluchat 4
pas_valide PHP - type juggling 3% 5248 30 vic 4
pas_valide PHP - preg_replace() 4% 5435 30 sambecks 4
pas_valide PHP - Loose Comparison 3% 3589 30 ghozt 4
pas_valide HTTP - Directory indexing 24% 41266 15 g0uZ 4
pas_valide Local File Inclusion 9% 14802 30 g0uZ 4
pas_valide Java - Server-side Template Injection 4% 5504 30 righettod 4
pas_valide SQL injection - Error 3% 3730 40 sambecks 4
pas_valide SQL injection - Time based 2% 2734 45 ycam 4
pas_valide Server Side Request Forgery 1% 626 50 sambecks 4
pas_valide SQL injection - Blind 3% 4091 50 g0uZ 4
pas_valide XPath injection - Blind 1% 1204 75 g0uZ 4
pas_valide File upload - Null byte 8% 13313 25 g0uZ 4
pas_valide XSLT - Code execution 2% 1851 30 ghozt 5
pas_valide XPath injection - Authentication 3% 4271 35 g0uZ 5
pas_valide XPath injection - String 2% 2366 40 g0uZ 5
pas_valide NoSQL injection - Blind 1% 1613 45 ghozt 5
pas_valide SQL Injection - Routed 2% 2299 35 soka 5
pas_valide SQL injection - Filter bypass 1% 1221 80 sambecks 5
pas_valide JSON Web Token (JWT) - Weak secret 2% 2491 25 Jrmbt 5
pas_valide Insecure Code Management 2% 3228 20 Swissky 6
pas_valide SQL injection - Numeric 5% 7561 35 g0uZ 6
pas_valide Command injection - Filter bypass 2% 3422 30 sambecks 6
pas_valide Backup file 17% 29704 15 g0uZ 7
pas_valide HTTP - Cookies 14% 23326 20 g0uZ 7
pas_valide Weak password 34% 59445 10 g0uZ 7
pas_valide CRLF 10% 16245 20 g0uZ 7
pas_valide SQL injection - String 6% 10091 30 g0uZ 8
pas_valide File upload - MIME type 9% 14530 20 g0uZ 8
pas_valide LDAP injection - Authentication 4% 5826 35 g0uZ 8
pas_valide Remote File Inclusion 4% 6381 30 g0uZ 8
pas_valide NoSQL injection - Authentication 3% 4429 35 mastho 8
pas_valide HTTP - Headers 16% 27815 15 Arod 9
pas_valide File upload - Double extensions 11% 18578 20 g0uZ 9
pas_valide PHP - assert() 5% 7764 25 Birdy42 9
pas_valide PHP - Eval 1% 1438 40 chmod 9
pas_valide HTTP - Verb tampering 15% 24837 15 g0uZ 10
pas_valide HTTP - Improper redirect 13% 21465 15 Arod 10
pas_valide HTTP - Open redirect 18% 30664 10 Swissky 10
pas_valide PHP - Command injection 17% 29382 10 sambecks 10
pas_valide HTTP - POST 12% 20042 15 Th1b4ud 10
pas_valide HTTP - User-agent 25% 42305 10 g0uZ 10
pas_valide SQL injection - Authentication 13% 21992 30 g0uZ 11

Challenge Results Challenge Results

Pseudo Challenge Lang date
vpoat   HTML - Source code 2 April 2020 at 04:59
Narashi   HTTP - Directory indexing 2 April 2020 at 04:52
Narashi   Directory traversal 2 April 2020 at 04:50
Tomy7698   PHP - Injection de commande 2 April 2020 at 04:33
twizzler66   HTML - Source code 2 April 2020 at 04:20
gioberty   PHP - Command injection 2 April 2020 at 04:18
solo otro nombre tonto   PHP - Injection de commande 2 April 2020 at 04:16
Tomy7698   HTML - Code source 2 April 2020 at 04:14
gioberty   HTTP - User-agent 2 April 2020 at 03:53
Pitx   JSON Web Token (JWT) - Introduction 2 April 2020 at 03:49