PFW ACM's CTF Practice

PFW ACM's CTF Practice

Home Resources Open-Source Intelligence Cryptography Password Cracking Wi-Fi Traffic Analysis Log Analysis Network Vulnerability Analysis Digital Forensics Reverse Engineering Web App Exploitation

Web Application Exploitation

Most websites we interact with on a daily basis are actually web applications. These typically involve having a front end (the pretty user facing side) and a back end (all the data/code). By understanding how the front end communicates with the back end, we can manipulate our queries and modify the back end or defend it.

Challenges