FSOCIETY

Identity & Access Compromise Initiative

SYSTEM COMPROMISE LEVEL 0 / 15 PWNED
Authentication

01 // The Disabled Lock

Client-side controls are not security. Bypass the disabled button.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Authentication

02 // Factory Reset

Default credentials are the easiest way in.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Authentication

03 // SQL Injection

Trick the database into ignoring the password check.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Authentication

04 // Session Hijack

Tamper with the cookie to elevate your role.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Authentication

05 // Brute Force

Crack the 4-digit PIN code.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Authorization

06 // IDOR Access

Change the ID parameter to view another user.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Authorization

07 // Hidden Toggles

Manipulate hidden form fields.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Authorization

08 // Forced Browsing

Find the hidden admin URL.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Authorization

09 // JWT Decode

Decode the token payload to find secrets.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Authorization

10 // Path Traversal

Read system files by escaping the web root.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Governance

11 // Ghost Users

Identify the active account that should be disabled.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Governance

12 // MFA Bypass

Manipulate the server response to skip 2FA.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Governance

13 // Self-Promotion

Violate Separation of Duties.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Governance

14 // OAuth Leak

Steal the token from the URL fragment.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED
Governance

15 // SAML Inspection

Decode the XML assertion to find the secret.

LAUNCH TERMINAL >>
SYSTEM COMPROMISED