Category Ethical Hacking

Lab: Information Disclosure on Debug Page 

This lab demonstrates a common vulnerability where sensitive information is exposed through a debug page. Applications often include diagnostic or debugging interfaces intended for development or administrative purposes. When these pages are accessible in production environments without proper access controls, they…

Lab: Information Disclosure in Error Messages 

In this lab, the application is vulnerable to information disclosure through detailed error messages. When unexpected input is provided to the server, it responds with a stack trace that reveals internal framework details. This type of vulnerability can expose sensitive…

Lab: Username Enumeration via Response Timing 

Introduction:  Timing-based vulnerabilities represent a sophisticated class of side-channel attacks that exploit variations in response times to extract sensitive information. This lab demonstrates how applications can inadvertently leak the existence of valid user accounts through measurable differences in processing time. Unlike traditional enumeration methods…

PortSwigger Lab: Password Reset Broken Logic 

Introduction:  Password reset mechanisms serve as critical recovery pathways for users who have lost access to their accounts. However, flawed implementation of these systems can introduce severe vulnerabilities that allow attackers to hijack accounts without legitimate ownership. This lab demonstrates how broken…

Lab: 2FA Simple Bypass 

PortSwigger Lab: 2FA Simple Bypass  Introduction:  Two-factor authentication (2FA) serves as a critical security layer for protecting user accounts, but improper implementation can render this protection ineffective. This lab demonstrates a common vulnerability where applications fail to properly enforce 2FA verification, allowing attackers to bypass the authentication…

PortSwigger Lab: Blind OS Command Injection with Time Delays 

Introduction:  The “Blind OS Command Injection with Time Delays” lab, part of the PortSwigger Web Security Academy, explores a more advanced form of command injection where the application does not directly return command output. Instead, attackers infer successful exploitation through behavioral cues—such…

PortSwigger Lab: OS Command Injection -Simple Case 

Introduction:  The PortSwigger Web Security Academy provides guided labs where security professionals can practice identifying and exploiting common vulnerabilities in web applications. The lab titled “OS Command Injection, Simple Case” demonstrates a fundamental security flaw that allows attackers to execute operating system commands through a vulnerable…