pwning-wargames
  • Introduction
  • Introduction
  • PREFACE
    • Why the E. Corp Shop exists
    • Architecture overview
    • Team and Ground Rules
  • PART I
    • Hacking preparations
      • Vulnerability Categories
      • Hacking exercise rules
      • Walking the "happy path"
  • Part II
    • Challenge hunting
      • Finding the Score Board
      • Injection
      • Broken Authentication
      • Forgotten Content
      • Roll your own Security
      • Sensitive Data Exposure
      • XML External Entities (XXE)
      • Improper Input Validation
      • Broken Access Control
      • Security Misconfiguration
      • Cross Site Scripting (XSS)
      • Insecure Deserialization
      • Vulnerable Components
      • Security through Obscurity
  • Part III
    • What happens next?
Powered by GitBook
On this page
  1. Part III

What happens next?

Danger Zone

Now that you've gotten your toes in the water around AppSec, take the next steps in your journey and into the REAL Wargames!

Go to ctowar.games/start and sign up for the VM Challenges - see who can beat the clock or find the best hacks... Good hunting!

PreviousSecurity through Obscurity

Last updated 6 years ago