ZTH: Web 2

Introduction

Section 1: IDOR
Introduction

Exploitation


Challenge




Section 2: Forced Browsing
Introduction

Manual Exploitation

Automatic Exploitation



Challenge




Section 3: API Bypassing
Introduction

Exploitation

Challenge




Last updated