Yes, our Hacking Challenges do map to specific security vulnerabilities. See table below for more details:
Challenge Name | Difficulty | Vulnerability | URL |
Indicating Hints | 3 | Obscure HTTP Challenge/ Information Disclosure
| |
Bank Transfer | 2 | Cross Site Request Forgery (CSRF) | |
/tmp/secrets File | 4 | Command Injection | |
Bank Account Number | 1 | SQL Injection | |
Mind Reader | 4 | HTTP related/ Broken Authentication | |
robots.txt is not the only one | 1 | Sensitive Data Exposure | |
JS Safe | 3 | Sensitive Data Exposure | |
JS Safe 3.0 | 3 | Sensitive Data Exposure | |
Steal Bitcoin | 4 | XXE |