Room progress ( 0% )
Task 1Intro
Task includes a deployable machine
Task 2[Section 1 - IDOR] - Intro
Task 3[Section 1 - IDOR] - Exploitation
Task 4[Section 1 - IDOR] - Challenge:
Task 5[Section 2 - Forced Browsing] - Intro
Task 6[Section 2 - Forced Browsing]: Manual Exploitation
Task 7[Section 2 - Forced Browsing]: Automatic Exploitation
Task 8[Section 2 - Forced Browsing]: Challenge
Task 9[Section 3: API bypassing] - Intro
Task 10[Section 3: API Bypassing]: Exploitation
Task 11[Section 3: API Bypassing]: Challenge
Ready to learn Cyber Security? Create your free account today!
The ZTH: Web 2 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in