Chapter 01 / 11
Reconnaissance & Disclosure
Most attacks start with reading, not exploiting.
11 chapters covering the bug classes that ship in real production code, from the obvious versions to the ones that survive a code review.
By the end you'll have hands-on practice across every bug class shipped in OopsSec Store — covering the full OWASP Top 10 (2025) plus the modern AI and supply-chain attack surface: reconnaissance, broken access control, client-side trust failures, XSS and CSRF, SQL injection, server-side parsers, authentication failures, SSRF, cryptographic mistakes, business logic flaws, AI/LLM attacks, and supply chain compromises. The order is built so the easy bugs sharpen the instincts you'll need for the harder ones.
The most important advice: try each challenge yourself before opening the walkthrough. Skills come from finding the bug, not from reading about it. And one rule that doesn't bend: only apply this to systems you own or are explicitly authorized to test.
Chapter 01 / 11
Most attacks start with reading, not exploiting.
Chapter 02 / 11
The bug almost every API has somewhere.
Chapter 03 / 11
Whatever the browser sends, the server has to verify.
Chapter 04 / 11
Your input, running in someone else's browser.
Chapter 05 / 11
One quote, one query, one breach.
Chapter 06 / 11
Parsers go where your business logic can't.
Chapter 07 / 11
Login is a feature. Auth is a system.
Chapter 08 / 11
Make the server fetch what you can't.
Chapter 09 / 11
Modern crypto is safe by default. Until it isn't.
Chapter 10 / 11
The new attack surface nobody trained for.
Chapter 11 / 11
Your code is fine. The 800 packages around it aren't.
End of the line
If you reached this point by finding each bug yourself before opening the walkthrough, you've built the instincts that matter: the same ones that flag real vulnerabilities in real code reviews. Congratulations.
Drop your name in the Hall of Fame if you flagged everything. And if you know a vulnerability pattern that belongs in here, open a pull request . New challenges are always welcome.