Skip to content

Latest commit

 

History

History
52 lines (42 loc) · 5.19 KB

README.md

File metadata and controls

52 lines (42 loc) · 5.19 KB

OWASP Top 10 CTF Challenges

Author: NullChapter


Challenge Categories

  1. Cryptographic Failures (Sensitive Data Exposure)
  2. Insecure Design
  3. Security Logging and Monitoring Failures (Insufficient Logging and Monitoring)
  4. Identification and Authentication Failures (Broken Authentication)
  5. Security Misconfiguration (XML External Entity (XXE))
  6. Server-Side Request Forgery (SSRF)
  7. Software and Data Integrity Failures (Insecure Deserialisation)
  8. Vulnerable and Outdated Components (Using Components & Known Vulnerabilites)
  9. Injection (Cross-Site Scripting (XSS))
  10. Broken Access Control

About

This repository contains OWASP Top 10 CTF challenges designed to test your skills in web application security. Each category includes both "easy" and "hard" challenges.

Challenges

Level Path Author
Easy Broken Access Control Author Name
Hard Broken Access Control Author Name
Easy Cryptographic Failures (Sensitive Data Exposure) Author Name
Hard Cryptographic Failures (Sensitive Data Exposure) Author Name
Easy Identification and Authentication Failures (Broken Authentication) Author Name
Hard Identification and Authentication Failures (Broken Authentication) Author Name
Easy Injection (Cross-Site Scripting (XSS)) Author Name
Hard Injection (Cross-Site Scripting (XSS)) Author Name
Easy Insecure Design Author Name
Hard Insecure Design adikpb
Easy Security Logging and Monitoring Failures (Insufficient Logging and Monitoring) Author Name
Hard Security Logging and Monitoring Failures (Insufficient Logging and Monitoring) Author Name
Easy Security Misconfiguration (XML External Entity (XXE)) Ranjith Ashok
Hard Security Misconfiguration (XML External Entity (XXE)) Ranjith Ashok
Easy Server-Side Request Forgery (SSRF) Likhit
Hard Server-Side Request Forgery (SSRF) Harshith
Easy Software and Data Integrity Failures (Insecure Deserialisation) Author Name
Hard Software and Data Integrity Failures (Insecure Deserialisation) Author Name
Easy Vulnerable and Outdated Components (Using Components & Known Vulnerabilites) Author Name
Hard Vulnerable and Outdated Components (Using Components & Known Vulnerabilites) Author Name

Author

Your Name