Echo Protocol
 _____     _
| ____|___| |__   ___
|  _| / __| '_ \ / _ \
| |__| (__| | | | (_) |
|_____\___|_| |_|\___/
 ____            _                  _
|  _ \ _ __ ___ | |_ ___   ___ ___ | |
| |_) | '__/ _ \| __/ _ \ / __/ _ \| |
|  __/| | | (_) | || (_) | (_| (_) | |
|_|   |_|  \___/ \__\___/ \___\___/|_|
ECHO PROTOCOL(1) Security Training Manual NAME echo-protocol - web-based security training platform DESCRIPTION A web-based game where you learn security by hacking and defending real vulnerabilities. Kinda like an escape room - but for hackers. Learn about exploits and how to run them. Find all the clues by crafting real exploits to complete the level. Complete the level to unlock defense mode - learn to fix and protect systems against these types of exploits. CHALLENGES Challenge 1: Cross-site Crisis ------------------------------------- Hunt for reflected XSS vulnerabilities in a simulated web application. - Learn the basics of XSS and exploit a reflected XSS vulnerability - Do recon by phishing around for sensitive info - Chain XSS with other vulnerabilities for deeper access OPTIONS --attack Enter attack mode for the specified challenge --defend Enter defense mode after completing attack mode --help Display this help message
P.S.
I'm a dev online looking for interesting ways of teaching web security. I put up this page to gauge interest before building it - if you're interested in learning more about web security and you're up for the challenge, get notified when this releases.