Welcome to the CTF Injection Challenges repository! This repository contains a collection of Capture The Flag (CTF) challenges focused on various types of injection attacks. These challenges are designed to help you learn and practice common web security vulnerabilities, including SQL Injection, Cross-Site Scripting (XSS), and more.
Learn about and exploit SQL Injection vulnerabilities. These challenges will guide you through identifying and exploiting SQL Injection points in web applications.
Practice both reflected and stored XSS attacks. Understand how to inject malicious scripts into web pages and how to protect against these attacks.
Explore techniques for session hijacking and cookie manipulation. Learn how to inject session cookies and gain unauthorized access to web applications.
Test your skills with various encryption-related challenges. These will include tasks related to understanding and breaking different types of encryption.
To set up the challenges, follow these steps:
- Clone the repository:
git clone https://github.com/Seva41/CTF_Injection.git
- Navigate to the project directory:
cd CTF_Injection
This will set up the necessary environment to run the challenges. You can access the challenges at http://localhost:PORT
, where PORT
is the port number specified in the app setup.
- Basic knowledge of web security vulnerabilities
Before running the application, ensure you have the following prerequisites installed:
- Python 3.x
- Flask
To install the dependencies, run:
pip install Flask
We welcome contributions! If you have any ideas for new challenges or improvements to existing ones, feel free to open an issue or submit a pull request.
- Fork the repository
- Create a new branch (git checkout -b feature/your-feature-name)
- Commit your changes (git commit -m 'Add some feature')
- Push to the branch (git push origin feature/your-feature-name)
- Open a pull request
This project is licensed under the GPL-3.0 License - see the LICENSE file for details.