Participants will hack into a series of vulnerable servers and get onto winners boards. Instead of using tools, you will create your own attacks. The easier challenges require nothing but a web browser: command injection and SQL injection. The harder challenges require a Kali Linux virtual machine and exploit buffer overflows at the binary level.
Hackers & Threats DevSecOps & Application Security
penetration testing secure coding software code vulnerability analysis exploit of vulnerability
Share With Your Community