{"id":160,"date":"2023-02-25T10:53:34","date_gmt":"2023-02-25T10:53:34","guid":{"rendered":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/?post_type=chapter&#038;p=160"},"modified":"2023-12-18T13:33:33","modified_gmt":"2023-12-18T13:33:33","slug":"ctf-ulesannete-loomine","status":"publish","type":"chapter","link":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/chapter\/ctf-ulesannete-loomine\/","title":{"rendered":"CTF-\u00fclesannete loomine"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Peat\u00fckk annab \u00fclevaate<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>kuidas luua CTF-\u00fclesandeid<\/li>\r\n \t<li>millistest kohtadest leiab n\u00e4idiseid<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\nCTF-\u00fclesannete loomiseks oleks hea kursis olla, milliseid \u00fclesandeid on maailmas olemas. V\u00f5ib-olla on kergem esialgu teha sarnaseid \u00fclesanded ehk v\u00f5tta m\u00f5ni \u00fclesanne aluseks ja siis seda muuta. Eestis on selleks \u00fcks hea \u00fclesannete portaal: <a href=\"https:\/\/ylesanded.targaltinternetis.ee\/\" target=\"_blank\" rel=\"noopener\">https:\/\/ylesanded.targaltinternetis.ee\/<\/a>\r\n\r\n<img class=\"alignnone wp-image-228 size-full\" src=\"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-content\/uploads\/sites\/3\/2023\/02\/ylesande-naide.png\" alt=\"\" width=\"1389\" height=\"693\" \/>\r\n\r\n\u00dclesande juures on m\u00f5istlik kirjeldada \u00e4ra:\r\n<ul>\r\n \t<li><strong>Pealkiri<\/strong><\/li>\r\n \t<li>Alateemast (mis liiki on \u00fclesanne)<\/li>\r\n \t<li>Liigi kirjeldusest (r\u00fcnne v\u00f5i kaitse, kuldvillak)<\/li>\r\n \t<li><strong>\u00dclesande raskusaste<\/strong><\/li>\r\n \t<li>\u00dclesande lahendamisele kuluv keskmine aeg<\/li>\r\n \t<li>\u00d5piv\u00e4ljundist (mida \u00fclesanne m\u00f5\u00f5dab)<\/li>\r\n \t<li>Kirjeldusest (kontekst vastavalt stsenaariumile, kui vaja)<\/li>\r\n \t<li><strong>\u00dclesande kirjeldus (mida tegema peab, mis on eesm\u00e4rk, kuhu peab j\u00f5udma\/saavutama)<\/strong><\/li>\r\n \t<li><strong>\u00dclesande sisumaterjalid: tekstid, pildid, videod jms failid, algkood, l\u00f5ppfailid, serverid jne.<\/strong><\/li>\r\n \t<li>\u00dclesande kasutuskirjeldus: (1) kuidas k\u00e4ivitada, (2) loetelu failidest, mida antakse lahendajale, (3) kuidas lahendada, (4) vihjed, (5) kuidas lippu muuta ja taas kompileerida<\/li>\r\n \t<li>Loetelu lisamaterjalidest, programmidest, mis on vajalikud \u00fclesande lahendamiseks (viidatav mini-\u00f5ppematerjal kui vaja)<\/li>\r\n \t<li><strong>\u00d5ige vastus(ed), \u201clipp\u201d (Flag)<\/strong><\/li>\r\n<\/ul>\r\nRasvaselt on m\u00e4rgitud info, mis on h\u00e4davajalik \u00fclesande loomisel.\r\n\r\nEdasij\u00f5udnutele!\r\n<div class=\"textbox textbox--examples\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">N\u00e4iteid \u00fclesannete teemadest Eestis talenditaseme v\u00f5istlustel**<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Non-blind SQL injection \u2013 v\u00f5istleja peab kasutama \u00e4ra lihtsamat korralikult t\u00f6\u00f6tlemata sisendit SQL lause k\u00e4itumise muutmiseks<\/li>\r\n \t<li>Android APK reverse-engineering - v\u00f5istleja peab pakkima lahti Androidi rakenduse mis on .apk kujul ja leidma selle ressurssidest (nt strings.xml) vajaliku \u00fcles leidma<\/li>\r\n \t<li>OSINT \u2013 Fotol v\u00f5i muul sarnasel sisus olev info v\u00f5imaldab paari-kolme sammuga tuvastada mingi saladuse (vms.) mis v\u00f5imaldab liigset ligip\u00e4\u00e4su nt FTP serverile<\/li>\r\n \t<li>Email forensics \u2013 Antud e-maili konto varukoopia (vms.) anal\u00fc\u00fcs toimunu selgitamiseks. Lihtsam s\u00f5naotsing\/grep (nt Outlook\u2019i .pst fail)<\/li>\r\n \t<li>Malware forensics \u2013 Lihtsama pahavara(perekonna) tuvastamine (kuid mitte keeruline reverseengineering, keerulisem v\u00f5iks olla pigem osa l\u00f5ppvoorust)<\/li>\r\n \t<li>Path traversal - v\u00f5istleja peab leidma veebirakenduses oleva path traversal turvaaugu ja sellega vajaliku faili v\u00e4lja lugema<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox textbox--examples\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">N\u00e4idiskeskkondasid ja \u00fclesannete kogusid**<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n\r\nMidagi ikka leiate, mis huvi pakub!\r\n\r\nENISA\/ECSC \u00fclesanded:\u00a0<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fchallenges.ecsc.eu%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1_Apo3ZwLuaI9DA4ZCztKq\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/challenges.ecsc.eu\/<\/a>\r\n\r\nErinevad keskkonnad:\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fctftime.org%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3vhvCuZujAbXtIzwqCYaUW\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/ctftime.org\/<\/a>\r\n\r\n<a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fpwnable.kr%2Fplay.php&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1sjvZApAVP5fb7bNH59VC8\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/pwnable.kr\/play.php<\/a>\r\n\r\n<a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Foverthewire.org%2Fwargames%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2tJxi4FLujCZc7zYCsrUOJ\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/overthewire.org\/wargames\/<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.hackthissite.org%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw35e0dc6qzIZKw-YiZyRMGK\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.hackthissite.org\/<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fctflearn.com%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1UrXZUbNUf-BAsHZIXaa7N\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/ctflearn.com\/<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fctf365.com%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0r7RXKtK6jeVtVayezCYer\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/ctf365.com\/<\/a>\r\n\r\n<a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Freversing.kr%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0P_eMQfXdrG3_gOK7QUueS\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/reversing.kr\/<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.vulnhub.com%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1LZaWXJ8YvPfyiEvNwgNMm\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.vulnhub.com\/<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fio.netgarage.org%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2p6ewDK-i7IGaFmF37tebA\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/io.netgarage.org\/<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.hacking-lab.com%2Findex.html&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0WW_cDm0WJ_lsqsLs-UCSe\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.hacking-lab.com\/index.html<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.cybrary.it%2Fcatalog%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0py6TG0WzMm0pEUP2z5X_f\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.cybrary.it\/catalog\/<\/a>\r\n\r\n<a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.dvwa.co.uk%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3kT7rYWlJMWVMyeV_gABfI\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.dvwa.co.uk\/<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.owasp.org%2Findex.php%2FCategory%3AOWASP_Top_Ten_Project&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw36d45ZCy8TRQtnj-MdwBQG\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.owasp.org%2Findex.php%2FOWASP_Juice_Shop_Project&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0qTB6iq1Hs0kj2Mx1Xg1Zt\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.owasp.org\/index.php\/OWASP_Juice_Shop_Project<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fopencyberchallenge.net%2Fwiki%2FDownloads&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3MxJHULKEMSYVYnhUnyBXL\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/opencyberchallenge.net\/wiki\/Downloads<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fexploit-exercises.com%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2euFm5sgoKzhXzZ2Ztq2-f\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/exploit-exercises.com\/<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fmicrocorruption.com%2Flogin&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3gJ5Mdh19lGIEfFJMue7cD\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/microcorruption.com\/login<\/a>\r\n\r\n<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Flegacy.hackerexperience.com%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1p9Qw1HHDstHWWGdbpFEwS\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/legacy.hackerexperience.com\/<\/a>\r\n\r\n24 p\u00e4hklit\u00a0<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.ripstech.com%2Fphp-security-calendar-2017%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1_mFCQrrZr_MtgNg8wUe0h\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.ripstech.com\/php-security-calendar-2017\/<\/a>\r\n\r\nKogumik\u00a0<a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.blackroomsec.com%2Fupdated-hacking-challenge-site-links%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1P3XLi6O-D-1KC_RFbGYoA\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.blackroomsec.com\/updated-hacking-challenge-site-links\/<\/a>\r\n\r\n<\/div>\r\n<\/div>\r\n&nbsp;","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Peat\u00fckk annab \u00fclevaate<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>kuidas luua CTF-\u00fclesandeid<\/li>\n<li>millistest kohtadest leiab n\u00e4idiseid<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>CTF-\u00fclesannete loomiseks oleks hea kursis olla, milliseid \u00fclesandeid on maailmas olemas. V\u00f5ib-olla on kergem esialgu teha sarnaseid \u00fclesanded ehk v\u00f5tta m\u00f5ni \u00fclesanne aluseks ja siis seda muuta. Eestis on selleks \u00fcks hea \u00fclesannete portaal: <a href=\"https:\/\/ylesanded.targaltinternetis.ee\/\" target=\"_blank\" rel=\"noopener\">https:\/\/ylesanded.targaltinternetis.ee\/<\/a><\/p>\n<div class=\"wp-nocaption alignnone wp-image-228 size-full\"><img class=\"alignnone wp-image-228 size-full\" src=\"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-content\/uploads\/sites\/3\/2023\/02\/ylesande-naide.png\" alt=\"\" width=\"1389\" height=\"693\" srcset=\"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-content\/uploads\/sites\/3\/2023\/02\/ylesande-naide.png 1389w, https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-content\/uploads\/sites\/3\/2023\/02\/ylesande-naide-300x150.png 300w, https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-content\/uploads\/sites\/3\/2023\/02\/ylesande-naide-1024x511.png 1024w, https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-content\/uploads\/sites\/3\/2023\/02\/ylesande-naide-768x383.png 768w, https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-content\/uploads\/sites\/3\/2023\/02\/ylesande-naide-65x32.png 65w, https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-content\/uploads\/sites\/3\/2023\/02\/ylesande-naide-225x112.png 225w, https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-content\/uploads\/sites\/3\/2023\/02\/ylesande-naide-350x175.png 350w\" \/><\/div>\n<p>\u00dclesande juures on m\u00f5istlik kirjeldada \u00e4ra:<\/p>\n<ul>\n<li><strong>Pealkiri<\/strong><\/li>\n<li>Alateemast (mis liiki on \u00fclesanne)<\/li>\n<li>Liigi kirjeldusest (r\u00fcnne v\u00f5i kaitse, kuldvillak)<\/li>\n<li><strong>\u00dclesande raskusaste<\/strong><\/li>\n<li>\u00dclesande lahendamisele kuluv keskmine aeg<\/li>\n<li>\u00d5piv\u00e4ljundist (mida \u00fclesanne m\u00f5\u00f5dab)<\/li>\n<li>Kirjeldusest (kontekst vastavalt stsenaariumile, kui vaja)<\/li>\n<li><strong>\u00dclesande kirjeldus (mida tegema peab, mis on eesm\u00e4rk, kuhu peab j\u00f5udma\/saavutama)<\/strong><\/li>\n<li><strong>\u00dclesande sisumaterjalid: tekstid, pildid, videod jms failid, algkood, l\u00f5ppfailid, serverid jne.<\/strong><\/li>\n<li>\u00dclesande kasutuskirjeldus: (1) kuidas k\u00e4ivitada, (2) loetelu failidest, mida antakse lahendajale, (3) kuidas lahendada, (4) vihjed, (5) kuidas lippu muuta ja taas kompileerida<\/li>\n<li>Loetelu lisamaterjalidest, programmidest, mis on vajalikud \u00fclesande lahendamiseks (viidatav mini-\u00f5ppematerjal kui vaja)<\/li>\n<li><strong>\u00d5ige vastus(ed), \u201clipp\u201d (Flag)<\/strong><\/li>\n<\/ul>\n<p>Rasvaselt on m\u00e4rgitud info, mis on h\u00e4davajalik \u00fclesande loomisel.<\/p>\n<p>Edasij\u00f5udnutele!<\/p>\n<div class=\"textbox textbox--examples\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">N\u00e4iteid \u00fclesannete teemadest Eestis talenditaseme v\u00f5istlustel**<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Non-blind SQL injection \u2013 v\u00f5istleja peab kasutama \u00e4ra lihtsamat korralikult t\u00f6\u00f6tlemata sisendit SQL lause k\u00e4itumise muutmiseks<\/li>\n<li>Android APK reverse-engineering &#8211; v\u00f5istleja peab pakkima lahti Androidi rakenduse mis on .apk kujul ja leidma selle ressurssidest (nt strings.xml) vajaliku \u00fcles leidma<\/li>\n<li>OSINT \u2013 Fotol v\u00f5i muul sarnasel sisus olev info v\u00f5imaldab paari-kolme sammuga tuvastada mingi saladuse (vms.) mis v\u00f5imaldab liigset ligip\u00e4\u00e4su nt FTP serverile<\/li>\n<li>Email forensics \u2013 Antud e-maili konto varukoopia (vms.) anal\u00fc\u00fcs toimunu selgitamiseks. Lihtsam s\u00f5naotsing\/grep (nt Outlook\u2019i .pst fail)<\/li>\n<li>Malware forensics \u2013 Lihtsama pahavara(perekonna) tuvastamine (kuid mitte keeruline reverseengineering, keerulisem v\u00f5iks olla pigem osa l\u00f5ppvoorust)<\/li>\n<li>Path traversal &#8211; v\u00f5istleja peab leidma veebirakenduses oleva path traversal turvaaugu ja sellega vajaliku faili v\u00e4lja lugema<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox textbox--examples\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">N\u00e4idiskeskkondasid ja \u00fclesannete kogusid**<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<p>Midagi ikka leiate, mis huvi pakub!<\/p>\n<p>ENISA\/ECSC \u00fclesanded:\u00a0<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fchallenges.ecsc.eu%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1_Apo3ZwLuaI9DA4ZCztKq\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/challenges.ecsc.eu\/<\/a><\/p>\n<p>Erinevad keskkonnad:<\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fctftime.org%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3vhvCuZujAbXtIzwqCYaUW\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/ctftime.org\/<\/a><\/p>\n<p><a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fpwnable.kr%2Fplay.php&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1sjvZApAVP5fb7bNH59VC8\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/pwnable.kr\/play.php<\/a><\/p>\n<p><a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Foverthewire.org%2Fwargames%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2tJxi4FLujCZc7zYCsrUOJ\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/overthewire.org\/wargames\/<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.hackthissite.org%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw35e0dc6qzIZKw-YiZyRMGK\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.hackthissite.org\/<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fctflearn.com%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1UrXZUbNUf-BAsHZIXaa7N\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/ctflearn.com\/<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fctf365.com%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0r7RXKtK6jeVtVayezCYer\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/ctf365.com\/<\/a><\/p>\n<p><a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Freversing.kr%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0P_eMQfXdrG3_gOK7QUueS\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/reversing.kr\/<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.vulnhub.com%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1LZaWXJ8YvPfyiEvNwgNMm\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.vulnhub.com\/<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fio.netgarage.org%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2p6ewDK-i7IGaFmF37tebA\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/io.netgarage.org\/<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.hacking-lab.com%2Findex.html&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0WW_cDm0WJ_lsqsLs-UCSe\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.hacking-lab.com\/index.html<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.cybrary.it%2Fcatalog%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0py6TG0WzMm0pEUP2z5X_f\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.cybrary.it\/catalog\/<\/a><\/p>\n<p><a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.dvwa.co.uk%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3kT7rYWlJMWVMyeV_gABfI\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.dvwa.co.uk\/<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.owasp.org%2Findex.php%2FCategory%3AOWASP_Top_Ten_Project&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw36d45ZCy8TRQtnj-MdwBQG\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.owasp.org%2Findex.php%2FOWASP_Juice_Shop_Project&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw0qTB6iq1Hs0kj2Mx1Xg1Zt\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.owasp.org\/index.php\/OWASP_Juice_Shop_Project<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fopencyberchallenge.net%2Fwiki%2FDownloads&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3MxJHULKEMSYVYnhUnyBXL\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/opencyberchallenge.net\/wiki\/Downloads<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fexploit-exercises.com%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw2euFm5sgoKzhXzZ2Ztq2-f\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/exploit-exercises.com\/<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fmicrocorruption.com%2Flogin&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw3gJ5Mdh19lGIEfFJMue7cD\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/microcorruption.com\/login<\/a><\/p>\n<p><a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Flegacy.hackerexperience.com%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1p9Qw1HHDstHWWGdbpFEwS\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/legacy.hackerexperience.com\/<\/a><\/p>\n<p>24 p\u00e4hklit\u00a0<a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.ripstech.com%2Fphp-security-calendar-2017%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1_mFCQrrZr_MtgNg8wUe0h\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.ripstech.com\/php-security-calendar-2017\/<\/a><\/p>\n<p>Kogumik\u00a0<a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.blackroomsec.com%2Fupdated-hacking-challenge-site-links%2F&amp;sa=D&amp;sntz=1&amp;usg=AOvVaw1P3XLi6O-D-1KC_RFbGYoA\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.blackroomsec.com\/updated-hacking-challenge-site-links\/<\/a><\/p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n","protected":false},"author":8,"menu_order":8,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"part":144,"_links":{"self":[{"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/pressbooks\/v2\/chapters\/160"}],"collection":[{"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/wp\/v2\/users\/8"}],"version-history":[{"count":6,"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/pressbooks\/v2\/chapters\/160\/revisions"}],"predecessor-version":[{"id":874,"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/pressbooks\/v2\/chapters\/160\/revisions\/874"}],"part":[{"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/pressbooks\/v2\/parts\/144"}],"metadata":[{"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/pressbooks\/v2\/chapters\/160\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/wp\/v2\/media?parent=160"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/pressbooks\/v2\/chapter-type?post=160"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/wp\/v2\/contributor?post=160"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/web.htk.tlu.ee\/informaatika\/digiloovtoo\/wp-json\/wp\/v2\/license?post=160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}