Don't like this style? Click here to change it! blue.css

LOGIN:
Welcome .... Click here to logout

Web Sec Challenges

I'm proud of these and I sometimes send people to this page to find cool web problems. But I'm resetting the semester too. So you can find old problems at: 2021 Problems and Fall 22 CTF problems

(inspect) https://websec.prof.ninja/jsninja/
(inspect) https://websec.prof.ninja/basics/
(Hello Node) https://amplified-obtainable-deposit.glitch.me/
(selector fun) https://websec.prof.ninja/ctf/selectors/
JS Flag Checker
Contextual Guessing
Find it
https://graceful-four-hummingbird.glitch.me/
(Firebase basics) Implied by the Firebase CRUD notes
(Firebase fetching, dynamic client-side URLs) https://minceraft-game.web.app/ (WARNING this updates every 60 seconds)
(Firebase Authentication) https://authflagproject.web.app/
(OSINT) https://websec.prof.ninja/osint
(Firebase RBAC) https://codepen.io/AndyNovo/full/JjJBjGR
(Session Hijacking) http://sessions.fsg.opalstacked.com/
Just a Pure SQL problem, no injection yet.
(BLIND SQLi) https://websec.prof.ninja/sql/blind/
(Password entropy) https://websec.prof.ninja/passwords/login.html
(Password stretching) https://gist.github.com/AndyNovo/0f92821ea081b33bdf706df13fc461b5
(Firebase Oracle)

(Speedrun 1: LFI)https://dtctf.herokuapp.com/
(Speedrun 2: exposed .git)https://pswd.fsg.opalstacked.com/
(Speedrun 3: Type Juggling)https://lampdemo.herokuapp.com/
(Speedrun 4: UNSERIALIZATION)https://pickledrick.herokuapp.com/
(Hard XSS) https://xssflag.web.app/ On this one I'm asking you to hack me, so DM me if you need me to jump on the site and get hacked by you. Flag is in admin's private user data.
(JWTs Level 1) https://heliotrope-auspicious-sparrow.glitch.me/
(JWTs Level 2) https://west-tinted-ferret.glitch.me/
(OTP xor)https://gist.github.com/AndyNovo/44bee80d68db2d3c5a6a8314c703d5b4
(Pohlig-Hellman)https://gist.github.com/AndyNovo/8a8602f823881bb8e9c461a9f10b01f2#file-pohlig-py
(10 flags RSA workshop): https://gist.github.com/AndyNovo/db07790dc9bd57a343de8a42d5b992ad
(BurpSuite Repeater): https://screeching-possible-talk.glitch.me/
(Prototype Pollution) https://knotty-conscious-firewall.glitch.me/
(SSTI) https://general-immediate-fish.glitch.me/stuffhere and Source code here
(OWASP Juice Shop) Setup Juice Shop in CTF FLAG MODE take a screenshot of a flag you get
(Lambda Pyjail) https://gist.github.com/AndyNovo/03e98f2a06f36b7fd557afcbc785b942
(S3 Misconfig) http://fall23webhost.s3-website-us-east-1.amazonaws.com/