pathtraversal
Level: 1 Link: https://dreamhack.io/wargame/challenges/12/ Description An API server that retrieves user information. Use the Path Traversal vulnerability to obtain the flag in /api/f...
Level: 1 Link: https://dreamhack.io/wargame/challenges/12/ Description An API server that retrieves user information. Use the Path Traversal vulnerability to obtain the flag in /api/f...
Level: 1 Link: https://dreamhack.io/wargame/challenges/38/ Description It is a file storage service written in PHP. Use the file upload vulnerability to obtain the flag. The flag is lo...
Level: 1 Link: https://dreamhack.io/wargame/challenges/37/ Description A Web service in which a File Download vulnerability exists. When you download the flag.py, you can earn the fla...
Level: 1 Link: https://dreamhack.io/wargame/challenges/412/ Description Simple Error Based SQL Injection ! Attached CREATE DATABASE IF NOT EXISTS `users`; GRANT ALL PRIVILEGES ON users...
Level: 1 Link: https://dreamhack.io/wargame/challenges/267/ Description Use the Sources tab feature in the developer tools to find the flags. The flag type is DH{…}. Solution Flag ...
Level: 1 Link: https://dreamhack.io/wargame/challenges/26/ Description It is a service that implements several functions and a bot that checks the entered URL. Use the CSRF vulnerabil...
Level: 1 Link: https://dreamhack.io/wargame/challenges/6/ Description It is a simple login service that manages authentication status with cookies. If you successfully log in with the ad...
Level: 1 Link: https://dreamhack.io/wargame/challenges/44/ Description A service that sends ping packets to a specific Host. Acquire the flag through Command Injection. The flag is lo...
Level: 2 Link: https://dreamhack.io/wargame/challenges/411 Description The administrator’s password consists of “ASCII Code” and “Hangul”. Attached CREATE DATABASE user_db CHARACTER S...
Level: 1 Link: https://dreamhack.io/wargame/challenges/984 Description This is a web service that prints out the information of your account when you log in. Obtain a flag through SQL...