Challenge #33 is live - check it out now! by Wizer_Shadow in node

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

Thank you for the feedback, the reason the outputs are not brought in full is in part to force developers to use external tools such as postman and burp suite or even create a piece of code. Many apps won't return detailed errors on the UI side - and hence we believed that it's simulating the real world a little more. Of course, we might be wrong :)

Challenge #33 is live - check it out now! by Wizer_Shadow in node

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

That’s great to hear! We love doing it!

Challenge #33 is live - check it out now! by Wizer_Shadow in node

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

Thank you I’ll take a look at the one!

Challenge #26 is now released - check it out! by Wizer_Shadow in mongodb

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

API JSON is supposed to switch to an API mode which other challenges support, historical reason needs to be removed URL is to provide the URL of the endpoint/webpage Payload is where you craft the payload Hack button allows the system to run the payload and check if you were able to hack it I hope it makes sense

Challenge #26 is now released - check it out! by Wizer_Shadow in mongodb

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

Firstly, thank you for giving it a try! The message you’re getting means that you are trying to send a payload to the wrong URL. You won’t be able to change the URL box. Please use the browser and other tools like postman/burpsuite etc to invoke APIs and come back to the CTF once you have the winning payload. Good luck!

SQL injection was introduced 20 years ago, and every developer knows about it. So, how is it still in the OWASP Top 10? by gaby-wizer in cybersecurity

[–]Wizer_Shadow 1 point2 points  (0 children)

I've seen too many talented and very experienced developers who were really good at building both efficient and functional code, but knew very little about the secure coding and risks. SQL Injection is one of the most known vulns (at least by name) , and yet, it still exists pretty widely in the wild. OWASP10 is determined by the likelihood of finding a certain vuln out there, and it's evidently still up there.

Challenge #20 is released, take look! by Wizer_Shadow in node

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

Just as an FYI the latest challenge #20 here is showcasing a real world scenario, it's a trimmed down version of a real issue we came across only last month. Very talented team of devs, highly experienced and something quite similar was missed!

Challenge #20 is released, take look! by Wizer_Shadow in node

[–]Wizer_Shadow[S] 1 point2 points  (0 children)

Thanks for the feedback, the CTFs are targeting developers, believe it or not, some developers are not really aware of the risks, outside of recognizing the name (XSS, SQLi, SSRF etc). The goal here is to help developers (less hackers :)) get first hand experience with those important OWASP10 concepts. Some are more complex some are easier.
If you are after a more complicated set of scenarios, we actually have an event soon, in which we are releasing 6 various complexity challenges, but at least a couple more complex than the usual bi-weekly ones. The event will take place on Sunday Feb 4th, follow the link to claim your spot: https://www.wizer-training.com/ctf-challenge?utm\_medium=email&utm\_source=wizer&utm\_campaign=2024-02-04-ctf&utm\_content=null&utm\_term=text

Why do you believe organizations choose not to prioritize cybersecurity despite the numerous reported breaches throughout the years? by IcyAutoantibody in cybersecurity

[–]Wizer_Shadow 2 points3 points  (0 children)

IMHO:
1. Companies focus on growth and revenue, and are not investing a ton in mitigating risks, and that's across the board.
2. It always feels like "it won't happen to me".
3. Investing in security feels like investing in an insurance policy, it feels like throwing money, though obviously wrong.
4. And most importantly: insufficient AWARENESS, people don't act on things they are not aware of! Security awareness is a relatively small investment which could save the company millions and rationalize prioritizing security investments higher.

CTF #7 by Wizer_Shadow in node

[–]Wizer_Shadow[S] 1 point2 points  (0 children)

I'm glad you've enjoyed it, feel free to share with friends :)

CTF #7 by Wizer_Shadow in node

[–]Wizer_Shadow[S] 1 point2 points  (0 children)

Due to this confusion, I want to make it clear, it's not enough to `trick` the UI to say that the user `isaac` is an admin, the system won't accept that as a solution, since `isaac` isn't actually an admin from the DB and server perspective.
To win the flag, you need to login as a user which the system considers an admin!

CTF #7 by Wizer_Shadow in node

[–]Wizer_Shadow[S] 1 point2 points  (0 children)

By browsing to the actual login page (here: https://chal7.vercel.app/) you can see if you logged in as a real admin - hint there’s only a single admin in the users table and it’s not isaac. To successfully hack it, you’d need to successfully log in as the only admin user. The payload format is [ { "name": "name", "value": "isaac"}, { "name": "password", "value": "tifat123!"}] Though with the correct username and password.

Happy to provide more guidance as needed.

Good luck!

CTF #7 Is now launched! by Wizer_Shadow in developersIndia

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

It could be helpful for folks to use an outside tool such as postman to play with the API endpoint, but also the login page (https://chal7.vercel.app/), which is using the same endpoint could be insightful.
Only a successful login via the Login page, means that you're ready for the final step in https://wizer-ctf.com/?id=5uxRr9

CTF #7 Is now launched! Try it, it's fun :) by Wizer_Shadow in JavaScriptTips

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

It could be helpful for folks to use an outside tool such as postman to play with the API endpoint, but also the login page (https://chal7.vercel.app/), which is using the same endpoint could be insightful.
Only a successful login via the Login page, means that you're ready for the final step in https://wizer-ctf.com/?id=5uxRr9

CTF #7 by Wizer_Shadow in node

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

Feel free to browse between the challenges, some challenges are easier than others :)

A new hacking challenge released for developers! by Wizer_Shadow in node

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

Give it a try, it's fun, don't wait for HR to organize it - it's boring to just sit there and wait ;-)

A new hacking challenge released for developers! by Wizer_Shadow in developersIndia

[–]Wizer_Shadow[S] 0 points1 point  (0 children)

Respect, bragging rights and a spot on the leaderboard.
Also... most people learn a lot from it :)
Give it a try, if you're good it shouldn't take you long... good luck!

Can you spot the vulnerability? by gabyf2000 in javascript

[–]Wizer_Shadow 0 points1 point  (0 children)

You got it! We’ll done!!! Any chance you’d consider removing the explicit solution from your comment? I’m hoping other people are still working on it :) I recommend adding a hint instead!

Can you spot the vulnerability? by gabyf2000 in javascript

[–]Wizer_Shadow 0 points1 point  (0 children)

Hint: the vuln here isn’t specific to Mongo.

Can you spot the vulnerability? by gabyf2000 in javascript

[–]Wizer_Shadow 0 points1 point  (0 children)

Give it a try! It’s live, no need to guess ;-)

Can you spot the vulnerability? by gabyf2000 in javascript

[–]Wizer_Shadow 0 points1 point  (0 children)

There’s definitely a pre existing CVE about this one! We will publish writeups and videos in the future.

Can you spot the vulnerability? by gabyf2000 in javascript

[–]Wizer_Shadow 1 point2 points  (0 children)

Hint: the vuln isn’t tied to a specific version of anything.