0rcruxe
584
Standort7180
Punkte234
Premium Übungen2
Compromissions
0%
App - Skript
0 Points0 / 33
- x Bash - System 1
- x sudo - weak configuration
- x Bash - System 2
- x LaTeX - Input
- x Powershell - Command Injection
- x AppArmor - Jail Introduction
- x Bash - unquoted expression injection
- x Docker - I am groot
- x Perl - Command injection
- x Powershell - SecureString
- x Bash - cron
- x LaTeX - Command execution
- x Python - input()
- x R : Code Execution
- x Powershell - Basic jail
- x Python - pickle
- x Bash - quoted expression injection
- x Docker - Sys-Admin’s Docker
- x Shared Objects hijacking
- x SSH - Agent Hijacking
- x AppArmor - Jail Medium
- x Bash - race condition
- x Docker - Talk through me
- x Python - format string
- x Python - PyJail 1
- x PHP - Jail
- x Python - PyJail 2
- x Python - Jail - Exec
- x Javascript - Jail
- x Python - Jail - Garbage collector
- x Bash - Restricted shells
- x Python - Eval Is Evil
- x Deep learning - Malicious model
0%
Anwendung - System
0 Points0 / 93
- x ELF x86 - Stack buffer overflow basic 1
- x ELF x64 - Basic heap overflow
- x ELF x86 - Stack buffer overflow basic 2
- x PE32 - Stack buffer overflow basic
- x ELF x86 - Format string bug basic 1
- x ELF x64 - Stack buffer overflow - basic
- x ELF x86 - Format string bug basic 2
- x ELF x86 - Race condition
- x ELF ARM - Stack buffer overflow - basic
- x ELF MIPS - Stack buffer overflow - No NX
- x ELF x64 - Double free
- x ELF x86 - Stack buffer overflow basic 3
- x ELF x86 - Use After Free - basic
- x ELF ARM - Stack Spraying
- x ELF x64 - Stack buffer overflow - PIE
- x ELF x86 - BSS buffer overflow
- x ELF x86 - Stack buffer overflow basic 4
- x ELF x86 - Stack buffer overflow basic 6
- x ELF x86 - Format String Bug Basic 3
- x PE32 - Advanced stack buffer overflow
- x ELF ARM - Basic ROP
- x ELF MIPS - Basic ROP
- x ELF RISC-V - Intro - let’s do the ROP
- x ELF x64 - Stack buffer overflow - Stack pivot
- x ELF x86 - Stack buffer overflow - C++ vtables
- x PE32+ Format string bug
- x ELF x64 - Logic bug
- x ELF x86 - Bug Hunting - Several issues
- x ELF x86 - Stack buffer and integer overflow
- x ELF x86 - Stack buffer overflow - ret2dl_resolve
- x ELF x86 - Stack buffer overflow basic 5
- x ELF x64 - Stack buffer overflow - advanced
- x ELF MIPS - Format String Glitch
- x ELF x64 - Heap Filling
- x ELF x86 - Information leakage with Stack Smashing Protector
- x ELF x64 - File Structure Hacking
- x ELF ARM - Race condition
- x ELF x64 - Browser exploit - Intro
- x ELF x64 - Buggy VM
- x ELF x64 - Heap Safe-Linking Bypass
- x ELF x64 - ret2dl_init
- x ELF x86 - Out of bounds attack - French Paradox
- x ELF x86 - Remote BSS buffer overflow
- x ELF x86 - Remote Format String bug
- x PE32+ Basic ROP
- x ELF x64 - Remote heap buffer overflow - tcache
- x ELF x86 - Blind remote format string bug
- x LinKern ARM - vulnerable syscall
- x LinKern x86 - Buffer overflow basic 1
- x ELF x64 - Sigreturn Oriented Programming
- x LinKern x86 - Null pointer dereference
- x ELF x64 - Syscall chaining
- x LinKern x64 - Race condition
- x ELF ARM - Alphanumeric shellcode
- x ELF MIPS - URLEncoded Format String bug
- x ELF x64 - Blind SROP
- x ELF x64 - Heap Hop
- x ELF x86 - Hardened binary 1
- x ELF x86 - Hardened binary 2
- x ELF x86 - Hardened binary 3
- x ELF x86 - Hardened binary 4
- x LinKern MIPSel - Vulnerable ioctl
- x LinKern x64 - reentrant code
- x ELF ARM - Heap format string bug
- x ELF ARM - Format String bug
- x ELF ARM - Use After Free
- x ELF x64 - FILE structure hijacking
- x ELF x64 - Heap feng-shui
- x ELF x64 - Off-by-one bug
- x ELF x86 - Hardened binary 5
- x LinKern ARM - Stack Overflow
- x LinKern x86 - basic ROP
- x ELF ARM - Heap Off-by-One
- x ELF x64 - Advanced blind format string exploitation
- x ELF x64 - Remote Heap buffer overflow 1
- x ELF x86 - Hardened binary 6
- x ELF x86 - Hardened binary 7
- x ELF x86 - Remote stack buffer overflow - Hardened
- x LinKern x64 - RowHammer
- x LinKern x64 - SLUB off-by-one
- x ELF ARM - Heap buffer overflow - Wilderness
- x ELF ARM - Heap Overflow
- x ELF ARM64 - Heap Underflow
- x ELF x64 - Seccomp Whitelist
- x ELF x86 - Blind ROP
- x LinKern x64 - Memory exploration
- x WinKern x64 - Advanced stack buffer overflow - ROP
- x WinKern x64 - Use After Free
- x ELF x64 - Remote Heap buffer overflow 2
- x ELF x64 - Advanced Heap Exploitation - Heap Leakless & Fortified
- x ELF x64 - Blind ROP
- x ELF x64 - Browser exploit - BitString
- x ELF ARM64 - Multithreading
0%
Knacken
0 Points0 / 66
- x ELF x86 - 0 protection
- x ELF x86 - Basic
- x PE x86 - 0 protection
- x ELF C++ - 0 protection
- x Godot - 0 protection
- x PE DotNet - 0 protection
- x APK - Introduction
- x ELF MIPS - Basic Crackme
- x ELF x64 - Golang basic
- x ELF x86 - Fake Instructions
- x ELF x86 - Ptrace
- x Godot - Bytecode
- x WASM - Introduction
- x APK - Flutter Debug
- x ELF ARM - Basic Crackme
- x ELF x64 - Basic KeygenMe
- x Unity3D Save handling
- x Godot - Mono
- x PE DotNet - Basic Anti-Debug
- x PE DotNet - Basic Crackme
- x PYC - ByteCode
- x ELF x86 - No software breakpoints
- x Lua - Bytecode
- x MachO x64 - keygenme or not
- x ELF ARM - crackme 1337
- x ELF x86 - CrackPass
- x ELF x86 - ExploitMe
- x ELF x86 - Random Crackme
- x GB - Basic GameBoy crackme
- x PDF - Javascript
- x PE x86 - Xor Madness
- x Powershell DeObfuscation
- x ELF ARM - Crypted
- x ELF x64 - Crackme automating
- x Godot - 3D model
- x NRO ARM - Switch homebrew
- x PE x86 - SEHVEH
- x APK - Anti-debug
- x APK - Insomni’Droid
- x ELF x64 - Rust backdoor
- x ELF x64 - Rust Crackme
- x PE x64 - UEFI Secure Boot
- x APK - Root My Droid
- x ELF x64 - Nanomites - Introduction
- x ELF x86 - Anti-debug
- x PE DotNet - KeygenMe
- x PE x64 - Tables in shambles
- x PE x86 - AutoPE
- x PYC - Self Modifying (Byte)Code
- x PYC - Snakeygen
- x ELF x86 - KeygenMe
- x HackerMan
- x Unity - Mono - Basic Game Hacking
- x WASM - Find the NPC
- x Bash - VM
- x ELF x64 - KeyGenMe
- x ELF x64 - Anti-debug and equations
- x Unity - IL2CPP - Basic Game Hacking
- x ELF x64 - Nanomites
- x ELF x86 - Packed
- x PE x86 - RunPE
- x ELF x86 - VM
- x ELF x64 - Hidden Control Flow
- x Ringgit
- x Voracious Nanomites
- x White-Box Cryptography #2
69%
Kryptoanalyse
1235 Points48 / 70
- o Encoding - ASCII
- o Encoding - UU
- o Hash - DCC
- o Hash - DCC2
- o Hash - LM
- o Hash - Message Digest 5
- o Hash - NT
- o Hash - SHA-2
- o Shift cipher
- o CISCO - Salted Password
- o Pixel Madness
- o ELF64 - PID encryption
- o File - PKZIP
- o Monoalphabetic substitution - Caesar
- o Circular Bit Shift
- o Known plaintext - XOR
- o Code - Pseudo Random Number Generator
- x Encoding - Codebook
- x File - PKZIP 2
- o File - Insecure storage 1
- o Polyalphabetic substitution - Vigenère
- o System - Android lock pattern
- o Transposition - Rail Fence
- o AES - CBC - Bit-Flipping Attack
- o AES - ECB
- x AES - ECB - Copy Paste
- o LFSR - Known plaintext
- o RSA - Factorisation
- o RSA - Decipher Oracle
- o Service - Timing attack
- o Monoalphabetic substitution - Polybe
- x Twisted secret
- o Initialisation Vector
- o Hill Cipher
- o GEDEFU
- o OTP - Implementation error
- o RSA - Corrupted key 1
- o RSA - Continued fractions
- o RSA - Common modulus
- o Service - Hash length extension attack
- o Shamir Secret Sharing - Introduction
- x AES - 4 Rounds
- x ECDSA - Introduction
- o RSA - Padding
- x RSA - Signature
- x Shamir Secret Sharing - Traitor
- o AES128 - CTR
- x PHP - mt_rand
- o Discrete logarithm problem
- o RSA - Corrupted key 2
- o RSA - Corrupted key 3
- o RSA - Multiple recipients
- x AES - Fault attack #1
- x FEAL - Differential Cryptanalysis
- x Enigma Machine
- x Side Channel - AES : CPA
- x ECDHE
- o RSA - H-rabin
- o RSA - Lee cooper
- o Service - CBC Padding
- x Side Channel - AES : first round
- o Polyalphabetic substitution - One Time Pad
- o White-Box Cryptography
- x AES - Weaker variant
- x Shamir Secret Sharing - Reduction
- x Hash - SHA-3
- x AES - Fault attack #2
- x Shamir Secret Sharing - Irreducible ?
- x AES-PMAC
- x ECDSA - Implementation error
73%
Forensische
1020 Points32 / 44
- o Deleted file
- o Capture this
- o Command & Control - level 2
- o MasterKee
- o Oh My Grub
- o Docker layers
- o Windows - LDAP User KerbeRoastable
- o Windows - NTDS Secret extraction
- o Logs analysis - web attack
- o Command & Control - level 5
- o Supply chain attack - Docker
- o Find the cat
- o Ugly Duckling
- o Windows - LDAP User ASRepRoastable
- o Active Directory - GPO
- o Command & Control - level 3
- x DNS exfiltration
- o Open My Vault
- o Web3 - Put on your mask - Step 1
- x C2 Mythic
- o Command & Control - level 4
- o Job interview
- x Homemade keylogger
- o macOS - Keychain
- o Malicious Word macro
- o Ransomware Android
- o Supply chain attack - Python
- x Air-gap exfiltration
- x iOS - Introduction
- o The Artist
- x Multi-devices
- o Command & Control - level 6
- o Find me
- o Rootkit - Cold case
- o Second job interview
- o Web3 - Put on your mask - Step 2
- o Find me again
- x Find me back
- x Find me on Android
- x Zeus Bot
- o Try again
- x The Lost Case - Mobile Investigation
- x Remote Support
- x Try again 2
0%
Programmierung
0 Points0 / 29
- x TCP - Back to school
- x TCP - Encoded string
- x TCP - The Roman wheel
- x TCP - Uncompress Me
- x CAPTCHA me if you can
- x Deep Learning - Introduction
- x Ethereum - Tutoreum
- x Mathematic progression
- x ELF x64 - Shellcoding - Sheep warmup
- x Ethereum - tx.origin
- x Second degree polynomial solver
- x Ethereum - Takeover
- x Various encodings
- x Apprentice Scraper
- x ARM - Shellcoding - Egg hunter
- x Ethereum - Bunker
- x Ethereum - NotSoPriv8
- x Adversarial Attack - GAN
- x Deep Learning - Captcha
- x ELF x64 - Shellcoding - Polymorphism
- x Ethereum - Architect
- x Ethereum - Reentrancy
- x Quick Response Code
- x WinKern x64 - shellcoding : token stealing
- x Ethereum - BadStack
- x ELF x64 - Sandbox shellcoding
- x Ethereum - King of the EVM
- x ELF x86 - Shellcoding - Alphanumeric
- x Adversarial Attack - Prison Break
10%
Realist
230 Points6 / 60
- x It happens, sometimes
- x End Droid
- x Windows - KerbeRoast
- o ComCyber - Challenge
- x P0wn3d
- x Windows - ASRepRoast
- x Windows - Group Policy Preferences Passwords
- x The h@ckers l4b
- x Windows - ZeroLogon
- o Neonazi inside
- x Windows - krbtgt history
- x Windows - sAMAccountName spoofing
- x Mersenne with 2
- x Bash/Awk - netstat parsing
- o Breaking Root-Me like it’s 2020
- x PyRat Auction
- x Root them
- x IPBX - call me maybe
- x Marabout
- o Root-We
- x Starbug Bounty
- o Ultra Upload
- x Well-known
- x A bittersweet shellfony
- x Bash - System Disaster
- x Django unchained
- x Imagick
- o MALab
- x SSHocker
- x Web TV
- x DasBox1 : Rififi in the lizardmen
- x SamBox v2
- x SamCMS
- x BBQ Factory - First Flirt
- x Extractor
- x Getting root Over it !
- x reQUACKier
- x Texode
- x BBQ Factory - Back To The Grill
- x In Your Kubernetass
- x DjangocatZ
- x Red Pills
- x Root Me, for real
- x SamBox v1
- x SAP Pentest 007
- x Crypto Secure
- x Bozobe Hospital
- x SamBox v3
- x ARM FTP Box
- x Bohemian RhapC2
- x I’m a Bl4ck H4t
- x SAP Pentest 000
- x Texode Back
- x Bluebox 2 - Pentest
- x Nodeful
- x Matrix terminal
- x Bluebox - Pentest
- x C for C-cure
- x Highway to shell
- x SamBox v4
0%
Netzwerk
0 Points0 / 33
- x FTP - authentication
- x TELNET - authentication
- x ETHERNET - frame
- x Kerberos - Authentication
- x NTLM - Authentication
- x Twitter authentication
- x Bluetooth - Unknown file
- x CISCO - password
- x DNS - zone transfert
- x IP - Time To Live
- x LDAP - null bind
- x OSPF - Authentication
- x POP - APOP
- x RF - AM Transmission
- x Data extraction
- x RF - FM Transmission
- x RF - Key Fixed Code
- x SIP - authentication
- x ETHERNET - Patched transmission
- x Global System Traffic for Mobile communication
- x HTTP - DNS Rebinding
- x SSL - HTTP exchange
- x Netfilter - common mistakes
- x SNMP - Authentification
- x Wired Equivalent Privacy
- x ICMP payload
- x ARP Spoofing - Active listening
- x XMPP - authentication
- x RF - Satellite transmission
- x WPA2 - Enterprise
- x ARP Spoofing - The man in the middle
- x RF - L Band
- x WPA3 - SAE
100%
Steganografie
505 Points23 / 23
- o EXIF - Metadata
- o Dot and next line
- o Steganomobile
- o Twitter Secret Messages
- o TXT - George and Alfred
- o WAV - Noise analysis
- o Poem from Space
- o Yellow dots
- o EXIF - Thumbnail
- o Mimic - Dummy sight
- o WAV - Spectral analysis
- o APNG - Just A PNG
- o Crypt-art
- o ELF x64 - Duality
- o PDF - Embedded
- o Genius ID
- o Kitty spy
- o PNG - Least Significant Bit
- o PNG - Pixel Indicator Technique
- o PNG - Pixel Value Differencing
- o Angecryption
- o Base Jumper
- o Hide and seek
81%
Web - Kunde
1350 Points34 / 42
- o HTML - disabled buttons
- o Javascript - Authentication
- o Javascript - Source
- o Javascript - Authentication 2
- o Javascript - Obfuscation 1
- o Javascript - Obfuscation 2
- o Javascript - Native code
- o Javascript - Webpack
- o Javascript - Obfuscation 3
- o XSS - Stored 1
- o AST - Deobfuscation
- o CSP Bypass - Inline code
- o CSP Bypass - Nonce 2
- o CSRF - 0 protection
- x Web Socket - 0 protection
- o XSS DOM Based - Introduction
- o Flash - Authentication
- o XSS DOM Based - AngularJS
- o XSS DOM Based - Eval
- o CSP Bypass - Dangling markup
- o CSP Bypass - JSONP
- o CSRF - token bypass
- o XSS - Reflected
- x CSP Bypass - Dangling markup 2
- x CSP Bypass - Nonce
- o CSS - Exfiltration
- o Javascript - Obfuscation 4
- o Relative Path Overwrite
- o XSS - Stored 2
- x XSS DOM Based - Filters Bypass
- o Self XSS - DOM Secrets
- x CSPT - The Ruler
- o DOM Clobbering
- o Javascript - Obfuscation 6
- o Self XSS - Race Condition
- x Browser - bfcache / disk cache
- o HTTP Response Splitting
- o Javascript - Obfuscation 5
- x XS Leaks
- o XSS - Stored - filter bypass
- o XSS - DOM Based
- x Same Origin Method Execution
95%
Web - Server
2840 Points91 / 96
- o HTML - Source code
- o HTTP - IP restriction bypass
- o HTTP - Open redirect
- o HTTP - User-agent
- o Weak password
- o PHP - Command injection
- o API - Broken Access
- o Backup file
- o HTTP - Directory indexing
- o HTTP - Headers
- o HTTP - POST
- o HTTP - Improper redirect
- o HTTP - Verb tampering
- o Install files
- o Nginx - Alias Misconfiguration
- x Nginx - Root Location Misconfiguration
- o API - Mass Assignment
- o CRLF
- o File upload - Double extensions
- o File upload - MIME type
- o Flask - Unsecure session
- o GraphQL - Introspection
- o HTTP - Cookies
- o Insecure Code Management
- o JWT - Introduction
- o XSS - Server Side
- o Directory traversal
- o File upload - Null byte
- o JWT - Revoked token
- o JWT - Weak secret
- o JWT - Unsecure File Signature
- o PHP - assert()
- o PHP - Apache configuration
- o PHP - Filters
- o PHP - register globals
- o PHP - Remote Xdebug
- o Python - Server-side Template Injection Introduction
- o File upload - ZIP
- o Flask - Development server
- o GraphQL - Injection
- o Command injection - Filter bypass
- o Java - Server-side Template Injection
- o JWT - Public key
- o JWT - Header Injection
- o Local File Inclusion
- o Local File Inclusion - Double encoding
- x Nginx - SSRF Misconfiguration
- o Node - Eval
- o PHP - Loose Comparison
- o PHP - preg_replace()
- o PHP - type juggling
- o Remote File Inclusion
- o SQL injection - Authentication
- o SQL injection - Authentication - GBK
- o SQL injection - String
- o XSLT - Code execution
- o Elixir - EEx
- o JWT - Unsecure Key Handling
- o LDAP injection - Authentication
- o Node - Serialize
- o NoSQL injection - Authentication
- o PHP - Path Truncation
- o PHP - Serialization
- o SQL injection - Numeric
- o SQL Injection - Routed
- o SQL Truncation
- o XML External Entity
- o XPath injection - Authentication
- o Yaml - Deserialization
- o API - Broken Access 2
- o GraphQL - Backend injection
- o GraphQL - Mutation
- o Java - Spring Boot
- o Local File Inclusion - Wrappers
- o PHP - Eval
- x PHP - Eval - Advanced filters bypass
- o SQL injection - Error
- o SQL injection - Insert
- o SQL injection - File reading
- o XPath injection - String
- o File upload - Polyglot
- o NodeJS - Prototype Pollution Bypass
- o NoSQL injection - Blind
- o SQL injection - Time based
- x Java - Custom gadget deserialization
- o NodeJS - vm escape
- o Server Side Request Forgery
- o SQL injection - Blind
- o LDAP injection - Blind
- o PHP - Unserialize overflow
- o PHP - Unserialize Pop Chain
- o SQL Injection - Second Order
- x Python - dotenv
- o Python - Blind SSTI Filters Bypass
- o XPath injection - Blind
- o SQL injection - Filter bypass