Advent of Cyber 2024
Dive into the wonderful world of cyber security by engaging in festive beginner-friendly exercises every day in the lead-up to Christmas! Day 2: One man’s false positive is another man’s potpourri...
Dive into the wonderful world of cyber security by engaging in festive beginner-friendly exercises every day in the lead-up to Christmas! Day 2: One man’s false positive is another man’s potpourri...
Can you exploit the sticker shop in order to capture the flag? The sticker shop is finally online! Your local sticker shop has finally developed its own webpage. They do not have too much experie...
Test your enumeration skills on this boot-to-root machine. Lookup offers a treasure trove of learning opportunities for aspiring hackers. This intriguing machine showcases various real-world vulne...
Light Welcome to the Light database application! I am working on a database application called Light! Would you like to try it out? If so, the application is running on port 1337. You can conn...
Can you exploit the CyberLens web server and discover the hidden flags? Let’s see If we can do this guys, Do you think so? Before we start let’s make sure that we added the domain in the hosts ...
Discover the inner workings of SSRF and explore multiple exploitation techniques. introduction The landscape of web attacks constantly evolves, with threat actors devising sophisticated methods t...
Get The highest privilege on the machine and find the flag! This is our target’s first page. Let’s start with the basics, such as scanning the page source and inspecting the elements. Okay, not...
I’m Just wanna Make Sure if you Are Mr.Robot this is our target: let’s start by inspecting the home page and the other pages in nav bars.. found nothing intersting at all, let’s brute force th...
Flag is hidden somewhere in the directory “We need to focus because the Level of this challenge is Hard.” I will use a simple xss to test this input and see if it is vulnerable or not. Simpl...
Take a deep dive into Meterpreter, and see how in-memory payloads can be used for post-exploitation. task 5 : Post-Exploitation Challenge The post-exploitation phase will have several goals; Me...