|
C7 - misconfigured .env-file
|
Uploaded backend info |
100 |
|
|
C8 - exposed git
|
Uploaded backend info |
100 |
|
|
C11 - IDOR Exploit
|
IDOR (Insecure Direct Object Reference) |
100 |
|
|
C13 - ROT13
|
Cipher |
100 |
|
|
Self-study - Easy
|
Uploaded backend info |
100 |
|
|
C6 - Stack Trace
|
Strack Trace |
100 |
|
|
C10 - Exploit URL parameters
|
URL Exploit |
100 |
|
|
C5 - SQL Injection
|
SQL Injection |
100 |
|
|
C4 - LLM Prompt Injection
|
Prompt Injection |
100 |
|
|
C3 - Exploit XSS to find the flag
|
XSS |
100 |
|
|
C2 - Unsafe API request
|
API |
100 |
|
|
C1 - Find a flag in the HTML code
|
Uploaded backend info |
100 |
|