Difficulty

Beginner

Details

This exercise explains how you can from a SQL injection gain access to the administration console. Then in the administration console, how you can run commands on the system.

What you will learn?

  • SQL injection exploitation using UNION
  • Cracking md5 hashed passwords
  • Writing a PHP webshell

Difficulty

Beginner

Details

This exercice describes the exploitation of a local file include with limited access. Once code execution is gained, you will see some post exploitation tricks.

What you will learn?

PHP include Reverse shell with netcat TCP redirection with socat

Difficulty

Beginner

Details

This exercise explains how you can exploit CVE-2012-1823 to retrieve the source code of an application and gain code execution.

What you will learn?

Exploiting CVE-2012-1823 The basics of metasploit Details on PHP security features

Difficulty

Advanced

Details

This exercise explains how you can exploit CVE-2012-2661 to retrieve information from a database.

What you will learn?

  • Exploiting CVE-2012-2661
  • Time based SQL injections

Difficulty

Beginner

Details

This exercice explains how to perform a Linux host review, what and how you can check the configuration of a Linux server to ensure it is securely configured. The reviewed system is a traditional Linux-Apache-Mysql-PHP (LAMP) server used to host a blog.

What you will learn?

  • System review
  • Users review
  • File system review
  • Network review
  • Services review

Difficulty

Intermediate

Details

After a short brute force introduction, this exercice explains the tampering of rack cookie and how you can even manage to modify a signed cookie (if the secret is trivial). Using this issue, you will be able to escalate your privileges and gain commands execution.

What you will learn?

  • Rack Cookies tampering
  • Writing small web scripts in Ruby
  • Commands injection attack

Difficulty

Beginner

Details

This exercise explains how you can from a SQL injection gain access to the administration console. Then in the administration console, how you can run commands on the system. If you didn't go through From SQL injection to shell, you should start there and move to this exercise later.

What you will learn?

  • SQL injection exploitation using UNION
  • Cracking md5 hashed passwords
  • Modifying Apache behavior with .htaccess files
  • Writing a PHP webshell

Difficulty

Beginner

Details

This exercise explains how you can exploit CVE-2008-1930 to gain access to the administration interface of a Wordpress installation.

What you will learn?

  • Exploiting CVE-2008-1930
  • Cookies manipulation
  • Mis-use of signature

Difficulty

Intermediate

Details

This exercice explains the interactions between Tomcat and Apache, then it will show you how to call and attack an Axis2 Web service. Using information retrieved from this attack, you will be able to gain access to the Tomcat Manager and deploy a WebShell to gain commands execution.

What you will learn?

  • Axis2 Web service
  • Writing a WebShell in JSP (Java)
  • Attacking the Tomcat Manager

Difficulty

Beginner

Details

This exercise is a set of the most common web vulnerabilities:

What you will learn?

  • Basics of Web
  • Basics of HTTP
  • Detection of common web vulnerabilities:
  • Cross-Site Scripting
  • SQL injections
  • Directory traversal
  • Command injection
  • Code injection
  • XML attacks
  • LDAP attacks
  • File upload
  • Basics of fingerprinting