CBBH
CBBH
Question
Section Answer
Number
Parameter Fuzzing -
5
Question 1 user
GET
58
Value Fuzzing Question 1 HTB{p4r4m373r_fuzz1n6_15_k3y!}
Skills Assessment -
Question 1 archive, test, faculty
Web Fuzzing
Skills Assessment -
Web Fuzzing
Question 2
#7
.php, .php7, .phps
m
Skills Assessment - http://faculty.academy.htb:PORT/courses/linux-s
Question 3
Web Fuzzing ecurity.php7
Skills Assessment -
to
Skills Assessment -
ch
Question 5 HTB{w3b_fuzz1n6_m4573r}
Web Fuzzing
Broken Authentication
te
Question
Section Answer
Number
Brute-Forcing Password
Question 1 One-Time Reset Token
Reset Tokens
Brute-Forcing Password
Question 2 -w
Reset Tokens
Brute-Forcing Password
Question 3 1000000
Reset Tokens
Question
Section Answer
Number
Brute-Forcing Password
Question 4 HTB{36DA098385E641D54E1B2750721D816E}
Reset Tokens
Vulnerable Password
Question 1 Manchester
Reset
Vulnerable Password
Question 2 HTB{D4740B1801D9880FF70DE227A54309F0}
Reset
5
Direct Access
58
Question 1 HTB{63593317426484EA6D270C2159335780}
Parameter Modification
Skills Assessment
Question 2
Question 1 #7HTB{d1f5d760d130f7dd11de93f0b393abda}
HTB{d86115e037388d0fa29280b737fd9171}
m
Bug Bounty Hunting Process
to
Command Injections
te
Question
Section Answer
Number
Other Injection
Question 1
Operators
Bypassing Other
Question 1 1nj3c70r
Blacklisted Characters
Bypassing Blacklisted
Question 1 HTB{b451c_f1l73r5_w0n7_570p_m3}
Commands
Question
Section Answer
Number
Advanced Command
Question 1 /usr/share/mysql/debian_create_root_user.sql
Obfuscation
5
DOM XSS Question 1 HTB{pur3ly_cl13n7_51d3}
58
XSS Discovery Question 1 email
Phishing
Session Hijacking
Question 1
Question 1 #7 HTB{r3f13c73d_cr3d5_84ck_2_m3}
HTB{4lw4y5_53cur3_y0ur_c00k135}
m
Skills Assessment Question 1 HTB{cr055_5173_5cr1p71n6_n1nj4}
File Inclusion
to
Question
Section Answer
ch
Number
Question
Section Answer
Number
5
Client-Side Validation Question 1 HTB{cl13n7_51d3_v4l1d4710n_w0n7_570p_m3}
58
Blacklist Filters Question 1 HTB{1_c4n_n3v3r_b3_bl4ckl1573d}
Type Filters
Question 1
Question 2
#7
HTB{m461c4l_c0n73n7_3xpl0174710n}
HTB{my_1m4635_4r3_l37h4l}
./images/
m
Skills Assessment - File
Question 1 HTB{m4573r1ng_upl04d_3xpl0174710n}
Upload Attacks
to
Hacking WordPress
ch
Login Question 1 80
Question
Section Answer
Number
5
Utilizing WHOIS Question 2 admin@dnstinations.com
58
Digging DNS Question 1 134.209.24.248
Subdomain
Bruteforcing
Question 1 #7 my.inlanefreight.com
m
DNS Zone Transfers Question 1 22
inlanefreight-
Creepy Crawlies Question 1
comp133.s3.amazonaws.htb
5
Skills Assessment Question 5 ba988b835be4aa97d068941dc852ff33
58
Introduction to Web Application
HTML
JavaScript Deobfuscation
Question
Section Answer
Number
Skills
Question 1 api.min.js
Assessment
Skills
Question 2 HTB{j4v45cr1p7_3num3r4710n_15_k3y}
Assessment
Skills
Question 3 HTB{n3v3r_run_0bfu5c473d_c0d3!}
Assessment
Skills
Question 4 4150495f70336e5f37333537316e365f31355f66756e
Assessment
5
Skills
Question 5 HTB{r34dy_70_h4ck_my_w4y_1n_2_HTB}
Assessment
58
Login Brute Forcing
Section
Question
Number #7 Answer
m
Brute Force Attacks Question 1 HTB{Brut3_F0rc3_1s_P0w3rfu1}
Basic HTTP
Question 1 HTB{th1s_1s_4_f4k3_fl4g}
Authentication
ch
Server-Side Attacks
Question
Section Answer
Number
Server-Side Attacks -
Question 1 HTB{3b8e2b940775e0267ce39d7c80488fc8}
5
Skills Assessment
58
Session Security
Question
Section Answer
Session Hijacking
Session Fixation
Number
Question 1
Question 1
#7
cookie
Yes
m
Obtaining Session
Identifiers without Question 1 Yes
to
User Interaction
Cross-Site Scripting
Question 1 Yes
(XSS)
ch
Cross-Site Request
Question 1 Yes
Forgery
te
Cross-Site Request
Question 1 Yes
Forgery (GET-based)
Cross-Site Request
Question 1 Yes
Forgery (POST-based)
5
Union Injection Question 1 root@localhost
58
Database Enumeration Question 1 9da2c9bcdf39d8610954e0e11ea8f45f
Writing Files
Question 1
d2b5b27ae688b6a0f1d21b7d3a0798cd
528d6d9cedc2c7aab146ef226e918396
m
SQLMap Essentials
to
Question
Section Answer
Number
ch
Running SQLMap
on an HTTP Question 1 HTB{700_much_c0n6r475_0n_p057_r3qu357}
te
Request
Running SQLMap
on an HTTP Question 2 HTB{c00k13_m0n573r_15_7h1nk1n6_0f_6r475}
Request
Running SQLMap
on an HTTP Question 3 HTB{j450n_v00rh335_53nd5_6r475}
Request
Database
Question 1 HTB{c0n6r475_y0u_kn0w_h0w_70_run_b451c_5qlm4p_5c4n}
Enumeration
Question
Section Answer
Number
Advanced
Database Question 1 PARAMETER_STYLE
Enumeration
Advanced
Database Question 2 Enizoom1609
Enumeration
Bypassing Web
Application Question 1 HTB{y0u_h4v3_b33n_c5rf_70k3n1z3d}
Protections
Bypassing Web
5
Application Question 2 HTB{700_much_r4nd0mn355_f0r_my_74573}
Protections
58
Bypassing Web
Application Question 3 HTB{y37_4n07h3r_r4nd0m1z3}
Protections
Bypassing Web
Application
Protections
Question 4 #7
HTB{5p3c14l_ch4r5_n0_m0r3}
m
OS Exploitation Question 1 HTB{5up3r_u53r5_4r3_p0w3rful!}
Question
Section Answer
te
Number
Web Attacks
Question
Section Answer
Number
5
Bypassing Basic
Question 1 HTB{4lw4y5_c0v3r_4ll_v3rb5}
Authentication
58
Bypassing Security
Question 1 HTB{b3_v3rb_c0n51573n7}
Filters
Mass IDOR
Enumeration
Bypassing Encoded
References
Question 1
Question 1
#7
HTB{4ll_f1l35_4r3_m1n3}
HTB{h45h1n6_1d5_w0n7_570p_m3}
m
IDOR in Insecure
Question 1 eb4fe264c10eb7a528b047aa983a4829
APIs
to
Chaining IDOR
Question 1 HTB{1_4m_4n_1d0r_m4573r}
Vulnerabilities
ch
Advanced File
te
Question 1 HTB{3rr0r5_c4n_l34k_d474}
Disclosure
Blind Data
Question 1 HTB{1_d0n7_n33d_0u7pu7_70_3xf1l7r473_d474}
Exfiltration
Web Requests
Question
Section Answer
Number
5
SOAPAction Spoofing Question 1 x86_64
58
Command Injection Question 1 root