A weakness in a system, application, or process that can be exploited by a threat actor to gain unauthorized access, escalate privileges, or cause harm.
Logger
Logger is a medium-difficulty Linux CTF challenge that revolves around a misconfigured internal log management system. Participants begin by authenticating to a web interface, where they must identify and exploit a Remote Code Execution (RCE) vulnerability.
PRO
Middleman
This lab demonstrates middleware authentication bypass vulnerability in Next.js, allowing unauthorized access to protected routes.
PRO
Commander
Step into the role of a daring investigator, tasked with uncovering a web vulnerability on the "Commander" machine. Each step takes you closer to the treasure ??? root access. Will you solve the puzzle?
PRO
One Click
An end user has installed some software that was not approved on the ITs list. This resulted in a vulnerability being exposed, can you exploit this windows machine?
PRO
Photography
Photos are fun but so is hacking into this website. Can you find the vulnerability?
PROPut theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free