dolgepesto
753
Posición
6500
Puntos
245
Premium Retos
10
Compromissions
45%
Aplicación - Guión
260 Points15 / 33
23%
Aplicación - Sistema
580 Points21 / 93
56%
Cracking
1055 Points39 / 70
32%
Criptoanálisis
355 Points24 / 75
45%
Forense
565 Points20 / 44
- o Deleted file
- x Capture this
- o Command & Control - level 2
- x MasterKee
- o Oh My Grub
- o Docker layers
- o Windows - LDAP User KerbeRoastable
- x Windows - NTDS Secret extraction
- o Logs analysis - web attack
- o Command & Control - level 5
- x Supply chain attack - Docker
- o Find the cat
- o Ugly Duckling
- x Windows - LDAP User ASRepRoastable
- o Active Directory - GPO
- o Command & Control - level 3
- o DNS exfiltration
- x Open My Vault
- x Web3 - Put on your mask - Step 1
- x C2 Mythic
- o Command & Control - level 4
- o Job interview
- o Homemade keylogger
- o macOS - Keychain
- o Malicious Word macro
- o Ransomware Android
- x Supply chain attack - Python
- x Air-gap exfiltration
- o iOS - Introduction
- x The Artist
- x Multi-devices
- o Command & Control - level 6
- x Find me
- x Rootkit - Cold case
- x Second job interview
- x Web3 - Put on your mask - Step 2
- x Find me again
- x Find me back
- x Find me on Android
- x Zeus Bot
- x Try again
- x The Lost Case - Mobile Investigation
- x Remote Support
- x Try again 2
10%
Programación
65 Points3 / 29
- x TCP - Back to school
- x TCP - Encoded string
- x TCP - The Roman wheel
- x TCP - Uncompress Me
- o CAPTCHA me if you can
- x Deep Learning - Introduction
- x Ethereum - Tutoreum
- o Mathematic progression
- o ELF x64 - Shellcoding - Sheep warmup
- x Ethereum - tx.origin
- x Second degree polynomial solver
- x Ethereum - Takeover
- x Various encodings
- x Apprentice Scraper
- x ARM - Shellcoding - Egg hunter
- x Ethereum - Bunker
- x Ethereum - NotSoPriv8
- x Adversarial Attack - GAN
- x Deep Learning - Captcha
- x ELF x64 - Shellcoding - Polymorphism
- x Ethereum - Architect
- x Ethereum - Reentrancy
- x Quick Response Code
- x WinKern x64 - shellcoding : token stealing
- x Ethereum - BadStack
- x ELF x64 - Sandbox shellcoding
- x Ethereum - King of the EVM
- x ELF x86 - Shellcoding - Alphanumeric
- x Adversarial Attack - Prison Break
35%
Realista
995 Points21 / 60
- o It happens, sometimes
- x End Droid
- x Windows - KerbeRoast
- x ComCyber - Challenge
- o P0wn3d
- x Windows - ASRepRoast
- o Windows - Group Policy Preferences Passwords
- o The h@ckers l4b
- x Windows - ZeroLogon
- o Neonazi inside
- x Windows - krbtgt history
- x Windows - sAMAccountName spoofing
- x Mersenne with 2
- o Bash/Awk - netstat parsing
- o Breaking Root-Me like it’s 2020
- o PyRat Auction
- o Root them
- o IPBX - call me maybe
- o Marabout
- o Root-We
- o Starbug Bounty
- o Ultra Upload
- o Well-known
- o A bittersweet shellfony
- x Bash - System Disaster
- x Django unchained
- o Imagick
- o MALab
- x SSHocker
- o Web TV
- x DasBox1 : Rififi in the lizardmen
- x SamBox v2
- x SamCMS
- x BBQ Factory - First Flirt
- x Extractor
- x Getting root Over it !
- x reQUACKier
- x Texode
- x BBQ Factory - Back To The Grill
- x In Your Kubernetass
- x DjangocatZ
- x Red Pills
- x Root Me, for real
- x SamBox v1
- x SAP Pentest 007
- x Crypto Secure
- x Bozobe Hospital
- x SamBox v3
- x ARM FTP Box
- x Bohemian RhapC2
- x I’m a Bl4ck H4t
- x SAP Pentest 000
- x Texode Back
- x Bluebox 2 - Pentest
- x Nodeful
- x Matrix terminal
- x Bluebox - Pentest
- x C for C-cure
- o Highway to shell
- o SamBox v4
53%
Red
330 Points18 / 34
- o FTP - authentication
- o TELNET - authentication
- o ETHERNET - frame
- x Kerberos - Authentication
- x NTLM - Authentication
- o Twitter authentication
- o Bluetooth - Unknown file
- o CISCO - password
- o DNS - zone transfert
- o IP - Time To Live
- o LDAP - null bind
- x OSPF - Authentication
- o POP - APOP
- o RF - AM Transmission
- x Data extraction
- o RF - FM Transmission
- x RF - Key Fixed Code
- o SIP - authentication
- o ETHERNET - Patched transmission
- o Global System Traffic for Mobile communication
- o HTTP - DNS Rebinding
- o SSL - HTTP exchange
- x Netfilter - common mistakes
- x SNMP - Authentification
- x Wired Equivalent Privacy
- o ICMP payload
- x ARP Spoofing - Active listening
- x XMPP - authentication
- x RF - Satellite transmission
- x WPA2 - Enterprise
- x ARP Spoofing - The man in the middle
- x RF - L Band
- x RIPv1 - no authentication
- x WPA3 - SAE
26%
Esteganografía
85 Points6 / 23
- x EXIF - Metadata
- o Dot and next line
- o Steganomobile
- x Twitter Secret Messages
- o TXT - George and Alfred
- o WAV - Noise analysis
- x Poem from Space
- x Yellow dots
- o EXIF - Thumbnail
- x Mimic - Dummy sight
- x WAV - Spectral analysis
- x APNG - Just A PNG
- o Crypt-art
- x ELF x64 - Duality
- x PDF - Embedded
- x Genius ID
- x Kitty spy
- x PNG - Least Significant Bit
- x PNG - Pixel Indicator Technique
- x PNG - Pixel Value Differencing
- x Angecryption
- x Base Jumper
- x Hide and seek
36%
Web - Cliente
350 Points15 / 42
- o HTML - disabled buttons
- o Javascript - Authentication
- o Javascript - Source
- o Javascript - Authentication 2
- o Javascript - Obfuscation 1
- o Javascript - Obfuscation 2
- o Javascript - Native code
- o Javascript - Webpack
- o Javascript - Obfuscation 3
- o XSS - Stored 1
- x AST - Deobfuscation
- x CSP Bypass - Inline code
- x CSP Bypass - Nonce 2
- o CSRF - 0 protection
- x Web Socket - 0 protection
- x XSS DOM Based - Introduction
- o Flash - Authentication
- x XSS DOM Based - AngularJS
- x XSS DOM Based - Eval
- x CSP Bypass - Dangling markup
- x CSP Bypass - JSONP
- o CSRF - token bypass
- o XSS - Reflected
- x CSP Bypass - Dangling markup 2
- x CSP Bypass - Nonce
- x CSS - Exfiltration
- x Javascript - Obfuscation 4
- x Relative Path Overwrite
- o XSS - Stored 2
- x XSS DOM Based - Filters Bypass
- x Self XSS - DOM Secrets
- x CSPT - The Ruler
- x DOM Clobbering
- x Javascript - Obfuscation 6
- x Self XSS - Race Condition
- x Browser - bfcache / disk cache
- x HTTP Response Splitting
- x Javascript - Obfuscation 5
- x XS Leaks
- x XSS - Stored - filter bypass
- x XSS - DOM Based
- x Same Origin Method Execution
66%
Web - Servidor
1860 Points63 / 96
- o HTML - Source code
- o HTTP - IP restriction bypass
- o HTTP - Open redirect
- o HTTP - User-agent
- o Weak password
- o PHP - Command injection
- x API - Broken Access
- o Backup file
- o HTTP - Directory indexing
- o HTTP - Headers
- o HTTP - POST
- o HTTP - Improper redirect
- o HTTP - Verb tampering
- o Install files
- x Nginx - Alias Misconfiguration
- x Nginx - Root Location Misconfiguration
- x API - Mass Assignment
- o CRLF
- o File upload - Double extensions
- o File upload - MIME type
- x Flask - Unsecure session
- o GraphQL - Introspection
- o HTTP - Cookies
- o Insecure Code Management
- o JWT - Introduction
- x XSS - Server Side
- o Directory traversal
- o File upload - Null byte
- x JWT - Revoked token
- o JWT - Weak secret
- x JWT - Unsecure File Signature
- o PHP - assert()
- x PHP - Apache configuration
- o PHP - Filters
- o PHP - register globals
- o PHP - Remote Xdebug
- x Python - Server-side Template Injection Introduction
- o File upload - ZIP
- x Flask - Development server
- x GraphQL - Injection
- o Command injection - Filter bypass
- o Java - Server-side Template Injection
- x JWT - Public key
- x JWT - Header Injection
- o Local File Inclusion
- o Local File Inclusion - Double encoding
- x Nginx - SSRF Misconfiguration
- x Node - Eval
- o PHP - Loose Comparison
- o PHP - preg_replace()
- o PHP - type juggling
- o Remote File Inclusion
- o SQL injection - Authentication
- o SQL injection - Authentication - GBK
- o SQL injection - String
- o XSLT - Code execution
- x Elixir - EEx
- x JWT - Unsecure Key Handling
- o LDAP injection - Authentication
- x Node - Serialize
- o NoSQL injection - Authentication
- o PHP - Path Truncation
- o PHP - Serialization
- o SQL injection - Numeric
- o SQL Injection - Routed
- o SQL Truncation
- o XML External Entity
- o XPath injection - Authentication
- x Yaml - Deserialization
- x API - Broken Access 2
- x GraphQL - Backend injection
- x GraphQL - Mutation
- o Java - Spring Boot
- o Local File Inclusion - Wrappers
- o PHP - Eval
- x PHP - Eval - Advanced filters bypass
- o SQL injection - Error
- o SQL injection - Insert
- o SQL injection - File reading
- o XPath injection - String
- x File upload - Polyglot
- x NodeJS - Prototype Pollution Bypass
- o NoSQL injection - Blind
- o SQL injection - Time based
- x Java - Custom gadget deserialization
- x NodeJS - vm escape
- o Server Side Request Forgery
- o SQL injection - Blind
- o LDAP injection - Blind
- x PHP - Unserialize overflow
- x PHP - Unserialize Pop Chain
- x SQL Injection - Second Order
- x Python - dotenv
- x Python - Blind SSTI Filters Bypass
- o XPath injection - Blind
- o SQL injection - Filter bypass