Live Hands-On Web Security Training

Vector

Where Systems Collapse

Four weeks of progressive challenges designed to build real-world penetration testing skills. Learn by doing, not by watching.

4
Weeks
18
Challenges
18
Real-World Labs

Organized By

In Collaboration With

What You'll Learn

Progressive weekly modules that mirror real-world attack surfaces — from initial reconnaissance to advanced exploitation.

W1

Surface Mapping

3 challenges

Reconnaissance, HTTP analysis, proxy setup

  • HTTP reconnaissance
  • Hidden endpoint discovery
  • Proxy configuration & traffic analysis
W2

Input Corruption

6 challenges

XSS, SQL injection, CSP bypass, file uploads

  • Reflected & stored XSS
  • SQL injection (UNION, blind)
  • CSP bypass & file upload abuse
W3

Access Breakdown

5 challenges

IDOR, session flaws, API security, JWT

  • Insecure direct object references
  • Session & cookie manipulation
  • API auth bypass & JWT attacks
W4

Controlled Collapse

4 challenges

Race conditions, business logic, report writing

  • Race condition exploitation
  • Business logic flaws
  • Professional report writing

Your Journey

From surface-level recon to advanced exploitation — each week builds on the last.

1

Surface Mapping

Learn to map attack surfaces, discover hidden endpoints, and analyze HTTP traffic like a professional pentester. Set up your proxy toolkit.

2

Input Corruption

Exploit injection flaws — XSS, SQLi, and file upload vulnerabilities — in a realistic e-commerce application environment.

3

Access Breakdown

Break authentication and authorization controls. Exploit IDOR, session flaws, API misconfigurations, and JWT weaknesses.

4

Controlled Collapse

Push systems to their limits with race conditions and business logic abuse. Finish by writing a professional vulnerability report.

Ready to Begin?

Access is restricted to participants who filled the form. Use the email you registered with to unlock all challenges.

  1. Access — Register with your course email to receive your unique challenge flags.
  2. Solve — Each week presents real-world vulnerable applications. Find the vulnerabilities, extract the flags.
  3. Document — Write a PDF report explaining your methodology, findings, and remediation steps.
  4. Submit — Send your report to the course email or Discord for review.
Access Course