🎯 Attack Simulator

Browser-based CTF challenges. No setup needed. Hack your way from Beginner to Elite. Earn XP and shareable badges.

66Challenges
0Completed
6,200Total XP
5Tiers
0% complete
🟠 Tier 4 — Hard (20)
#28
Script Kiddie
A search form reflects user input without sanitization. Inject a script to trigger an alert and prove XSS is possible.
#29
Token Forger
A JWT token controls your access. Decode it, change your role to admin, and forge a new token.
#30
Path Finder
A file viewer restricts access to /public/. Escape the directory and read /etc/passwd to find the flag.
#31
Identity Thief
An API returns user data at /api/user/1001. Your account is 1001. Change the ID to access the admin account at ID 1.
#32
Shell Shock
A web tool runs ping on user-supplied input. The input is not sanitized. Inject an OS command to read /etc/flag.
#33
Server Spy
A URL preview feature fetches any URL you provide. Trick it into fetching an internal service at http://169.254.169.254/flag.
#34
Request Forger
The password change form has no CSRF token. Craft a request that changes the admin password when they visit your page.
#35
Redirect Rogue
A login page redirects users after auth via ?redirect= parameter. Abuse it to redirect to an attacker-controlled site.
#36
Entity Expander
An XML parser accepts user input without disabling external entities. Inject an XXE payload to read /etc/flag from the server.
#37
Object Breaker
A Java application deserializes user-supplied objects. Craft a malicious serialized object to achieve remote code execution.
#38
File Includer
A PHP page includes files based on a parameter: page.php?file=about. Exploit LFI to read sensitive files using PHP filters.
#39
Speed Demon
A bank transfer endpoint checks balance before deducting. Send multiple requests simultaneously to exploit the TOCTOU race condition.
#40
Cross Origin
An API returns Access-Control-Allow-Origin: * with credentials. Steal the admin token from a cross-origin page.
#41
Domain Hijacker
A CNAME record points to a decommissioned cloud service. Claim the endpoint and serve your own content on the subdomain.
#42
Key Hunter
A mobile app bundles its API key in the JavaScript source. Decompile the app and extract the hardcoded secret.
#43
Template Breaker
A web app uses Jinja2 templates and reflects user input into the template. Inject a Server-Side Template Injection payload.
#44
Blind Oracle
The page shows no SQL errors, but responses differ based on true/false conditions. Extract the admin password one character at a time.
#45
DOM Manipulator
The page reads from location.hash and inserts it into the DOM via innerHTML. Craft a URL fragment that executes JavaScript.
#46
Auth Bypass
The admin panel checks authentication client-side in JavaScript. The API behind it has no auth. Access the admin API directly.
#47
Mass Assigner
The user profile update API accepts any field. Add "role":"admin" to your update request to escalate privileges.
🔴 Tier 5 — Elite (19)
#48
Header Hacker
An API endpoint checks the X-Admin-Key header. Intercept the request and add the correct header to access the admin panel.
#49
Binary Brain
An encoded message was intercepted in binary. Decode the binary to ASCII, then decode the result from hex to reveal the flag.
#50
Root Access
You have shell access as a low-privilege user. Find the SUID binary, exploit it, and read /root/flag.txt.
#51
Prototype Poisoner
A Node.js app deep-merges user input into objects. Pollute Object.prototype to inject isAdmin=true on all objects.
#52
Socket Snatcher
A WebSocket chat server has no origin validation. Connect from a malicious page and intercept admin messages.
#53
OAuth Outlaw
An OAuth implementation does not validate the redirect_uri parameter. Steal the authorization code by redirecting to your server.
#54
Time Bandit
The API key comparison uses string equality which returns early on mismatch. Extract the key by measuring response times.
#55
Packet Detective
A packet capture contains an HTTP login. Analyze the PCAP data to extract the credentials transmitted in cleartext.
#56
Hidden Pixels
A flag is hidden in the LSB (least significant bits) of an image. Extract the hidden message using steganography techniques.
#57
DNS Smuggler
Malware is exfiltrating data via DNS queries. Analyze the DNS logs to decode the stolen data hidden in subdomain labels.
#58
Dependency Doom
A popular npm package was compromised. Analyze the malicious code injected in a postinstall script to find the C2 domain.
#59
Key Injector
A JWT uses a "kid" header parameter to select the signing key from a file. Inject a path traversal to use /dev/null as the key.
#60
Schema Leaker
A GraphQL API has introspection enabled in production. Query the schema to discover hidden admin mutations and extract the flag.
#61
NoSQL Ninja
A MongoDB login uses $ne (not equal) operator vulnerability. Bypass authentication by injecting query operators.
#62
Firewall Evader
A WAF blocks common XSS patterns. Find a bypass using encoding, case variation, or alternative event handlers.
#63
Container Breakout
You have root in a Docker container. The Docker socket is mounted inside. Escape to the host by creating a privileged container.
#64
Golden Ticket
Extract a Kerberos TGS ticket for a service account, then crack its password offline using hashcat.
#65
Firmware Hacker
An IoT device firmware image contains hardcoded credentials. Extract the filesystem and find the default root password.
#66
Ransom Reverser
Ransomware encrypted files using a weak key derivation. The key is derived from the system time at encryption. Reverse the process.