pwning-wargames
  • Introduction
  • Introduction
  • PREFACE
    • Why the E. Corp Shop exists
    • Architecture overview
    • Team and Ground Rules
  • PART I
    • Hacking preparations
      • Vulnerability Categories
      • Hacking exercise rules
      • Walking the "happy path"
  • Part II
    • Challenge hunting
      • Finding the Score Board
      • Injection
      • Broken Authentication
      • Forgotten Content
      • Roll your own Security
      • Sensitive Data Exposure
      • XML External Entities (XXE)
      • Improper Input Validation
      • Broken Access Control
      • Security Misconfiguration
      • Cross Site Scripting (XSS)
      • Insecure Deserialization
      • Vulnerable Components
      • Security through Obscurity
  • Part III
    • What happens next?
Powered by GitBook
On this page
  1. PART I

Hacking preparations

Things to know before you hack...

PreviousTeam and Ground RulesNextVulnerability Categories

Last updated 6 years ago