The process of verifying the identity of a user or device, typically using credentials such as passwords, biometrics, certificates, or security tokens.
Middleman
This lab demonstrates middleware authentication bypass vulnerability in Next.js, allowing unauthorized access to protected routes.
PRO
Share Me
Leaked credentials have surfaced, giving you potential access to an S3 bucket. But broken authentication mechanisms stand in your way. Use the creds, bypass the flaws, and see what secrets you can uncover. Can you find the flag hidden deep within?
PRO
Hijack
The MySQL database on the machine 'Hijack' seems ripe for exploitation. Weak authentication and a lack of proper security controls give you a potential opening. Use your brute-forcing skills to break into the MySQL database, bypass the broken authentication mechanisms, and see what secrets lie within.
PRO
Kurby DC
Unravel Active Directory secrets in Kurby DC! Face fun and engaging tasks designed to test their skills in navigating complex AD environments. Participants will tackle challenges involving user authentication, group policies, and domain controllers to conquer the AD security landscape.
PROPut theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free