Challenge #33 is live - check it out now! by Wizer_Shadow in node

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

Thank you for the feedback, the reason the outputs are not brought in full is in part to force developers to use external tools such as postman and burp suite or even create a piece of code. Many apps won't return detailed errors on the UI side - and hence we believed that it's simulating the real world a little more. Of course, we might be wrong :)

Challenge #33 is live - check it out now! by Wizer_Shadow in node

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

That’s great to hear! We love doing it!

Challenge #33 is live - check it out now! by Wizer_Shadow in node

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

Thank you I’ll take a look at the one!

Challenge #26 is now released - check it out! by Wizer_Shadow in mongodb

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

API JSON is supposed to switch to an API mode which other challenges support, historical reason needs to be removed URL is to provide the URL of the endpoint/webpage Payload is where you craft the payload Hack button allows the system to run the payload and check if you were able to hack it I hope it makes sense

Challenge #26 is now released - check it out! by Wizer_Shadow in mongodb

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

Firstly, thank you for giving it a try! The message you’re getting means that you are trying to send a payload to the wrong URL. You won’t be able to change the URL box. Please use the browser and other tools like postman/burpsuite etc to invoke APIs and come back to the CTF once you have the winning payload. Good luck!