Offensive Security Intro
Hack your first website (legally in a safe environment) and experience an ethical hacker's job.
easy
Pentesting Fundamentals
Learn the important ethics and methodologies behind every pentest.
easy
Defensive Security Intro
Introducing defensive security and related topics, such as Threat Intelligence, SOC, DFIR, Malware Analysis, and SIEM.
easy
Careers in Cyber
Learn about the different careers in cyber security.
info
Principles of Security
Learn the principles of information security that secures data and protects systems from abuse
info
Walking An Application
Manually review a web application for security issues using only your browsers developer tools. Hacking with just your browser, no tools or scripts.
easy
Content Discovery
Learn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities.
easy
Subdomain Enumeration
Learn the various ways of discovering subdomains to expand your attack surface of a target.
easy
Authentication Bypass
Learn how to defeat logins and other authentication mechanisms to allow you access to unpermitted areas.
easy
IDOR
Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have.
easy
File Inclusion
This room introduces file inclusion vulnerabilities, including Local File Inclusion (LFI), Remote File Inclusion (RFI), and directory traversal.
medium
Burp Suite: The Basics
An introduction to using Burp Suite for web application pentesting.
info
Intro to SSRF
Learn how to exploit Server-Side Request Forgery (SSRF) vulnerabilities, allowing you to access internal server resources.
easy
Burp Suite: Repeater
Learn how to use Repeater to duplicate requests in Burp Suite.
info
Burp Suite: Intruder
Learn how to use Intruder to automate requests in Burp Suite.
medium
Burp Suite: Other Modules
Take a dive into some of Burp Suite's lesser-known modules.
easy
1 of 3 available pages