Skip to main contentSkip to main content
image

0%

Walking An Application

Manually review a web application for security issues using only your browsers developer tools. Hacking with just your browser, no tools or scripts.

image

0%

Content Discovery

Learn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities.

image

0%

Subdomain Enumeration

Learn the various ways of discovering subdomains to expand your attack surface of a target.

image

0%

Authentication Bypass

Learn how to defeat logins and other authentication mechanisms to allow you access to unpermitted areas.

image

0%

IDOR

Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have.

image

0%

File Inclusion

This room introduces file inclusion vulnerabilities, including Local File Inclusion (LFI), Remote File Inclusion (RFI), and directory traversal.

image

0%

Intro to SSRF

Learn how to exploit Server-Side Request Forgery (SSRF) vulnerabilities, allowing you to access internal server resources.

image

0%

Intro to Cross-site Scripting

Learn how to detect and exploit XSS vulnerabilities, giving you control of other visitors' browsers.

image

0%

Race Conditions

Learn about race conditions and how they affect web application security.

image

0%

Command Injection

Learn about a vulnerability allowing you to execute commands through a vulnerable app, and its remediations.

image

0%

SQL Injection

Learn how to detect and exploit SQL Injection vulnerabilities

Topic Rewind Recap

Lock in what you learned with a recap. Earn points and keep your streak.