
Black Friday Exclusive: 40% off annual subscriptions
01days
:
06hr
:
43min
:
50sec
Room progress ( NaN% )
Task 1Introduction
Task includes a deployable machine
Task 2Exploiting Outdated Version 3.3.5 of OWASP CRS
Task 3Exploiting Weak Configurations
Task 4Signature / Pattern Bypass
Task 5Parsing & Normalization Bypass
Task 6Protocol Manipulation
Task 7Conclusion
Ready to learn Cyber Security? Create your free account today!
The WAF: Exploitation Techniques room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in