Room progress ( 0% )
Task 1Introduction
Task 2Methodology
Task 3[Section 1 - SSTI] - What is SSTI
Task 4[Section 1 - SSTI] - Manual exploitation of SSTI.
Task 5[Section 1 - SSTI]: Automatic Exploitation of SSTI
Task 6[Section 1 - SSTI]: Challenge
Task includes a deployable machine
Task 7[Section 2 - CSRF]: What is CSRF
Task 8[Section 2 - CSRF]: Manual exploitation of CSRF
Task 9[Section 2 - CSRF]: Automatic Explotation
Task 10[Section 2 - CSRF]: Challenge?
Task 11[Section 3 - JWT] - Intro
Task 12[Section 3 - JWT]: Manual JWT Exploitation
Task 13[Section 3 - JWT] - Automatic JWT exploitation
Task 14[Section 3 - JWT]: Challenge!
Task includes a deployable machine
Task 15[Section 3.5 - JWT]: Intro
Task 16[Section 3.5: JWT]: Manually exploitating the JWT None vuln
Task 17[Section 3.5: JWT] - Automatic Exploitation
Task 18[Section 3.5 - JWT]: Challenge
Task includes a deployable machine
Task 19[Section 4: XXE] - Intro
Task 20[Section 4 - XXE]: Manual exploitation of XXE
Task 21[Section 4 - XXE]: Automatic exploitation
Task 22[Section 4 - XXE]: Challenge
Task includes a deployable machine
Task 23[Bonus Section] - JWT once again
Task 24[Bonus Section] - Bruteforcing JWT tokens.
Task 25[Bonus Section]: Challenge
Task 26Credits
Ready to learn Cyber Security? Create your free account today!
The ZTH: Obscure Web Vulns room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in