At the end of successfully completing this challenges series, you will be able to:


With this complex world where applications are massively interconnected and cohesively making the best use of one another's data, an attack can happen from every angle if you don't think beyond. These challenge series make you focus on benign attack vectors that can be launched via your controlled remote hosts. There may be a cost involved in setting up remote hosts by yourself. Despite most/all exercises focusing on one or a few types of attack, please bear in mind that all other attacks could be executed based on how the target application process them. 

How to start:
Click on your desired challenge from the left navigation panel.