Grand Line CTF β Challenge Board
18 vulnerabilities are hidden across this platform. Exploit real weaknesses, capture flags, and prove you can navigate the Grand Line of cybersecurity.
Wanted: Dead or Alive
The Marine HQ search system stores wanted poster data. Rumor has it the query is not quite⦠sanitized.
The Pirate's Echo
The Transponder Snail station echoes back every message to confirm delivery. No filtering. No escape.
World Govt Archives β Classified
The Archives let you "view" public documents. But some paths are not meant for public eyesβ¦
News Coo β Internal Dispatch
News Coo fetches news from external URLs on your behalf. What if it fetched something⦠internal?
Log Pose Redirect
The Log Pose navigation system redirects ships to their next destination. Destination is never validated.
Marine HQ β Unauthorized Entry
The Marine database login was configured in a hurry. Someone forgot to change the default credentials.
Secret Intel β Token Forgery
Intel is locked behind a JWT. If you can forge a token with the right role claim, the secret is yours.
Marie Jois β Gorosei Access
Marie Jois is protected. Only Gorosei may enter. But what if you could sign your own clearance?
Crew Forum β Stored Payload
The Pirate Forum stores messages from all crew members. What a lovely place to leave a permanent gift.
Exposed Treasure Map (.env)
Every ship keeps a manifest. Some captains leave it on deck. Check common paths.
The Lost Repository (.git/config)
Pirates keep logs of their voyages. Development crews sometimes forget to hide theirs.
Config in the Open (config.json)
API keys and database passwords should never live in a public-facing JSON fileβ¦
Unguarded Hold (/uploads)
The cargo hold door was left open. Walk right in and see what is being stored.
The Admiral's Shipyard (Jenkins)
Every response from this server contains a signature. Something old, something vulnerable.
The Devil's Lookup (Log4Shell)
A well-known RCE vulnerability lurks in the logging stack. A JNDI lookup is all it takes.
The Plugin Conspiracy
An outdated plugin announces its version to the world. That version has a known CVE.
Cross-Origin Heist (CORS)
This site allows cross-origin requests from anywhere. From your own page you can steal another user's data.
π¬ Run Nuclei Against This Site
# Quick scan β all categories .\nuclei_tool\nuclei.exe -u http://localhost:3000 -t .\docker-lab\nuclei-templates\ -duc # Specific tags .\nuclei_tool\nuclei.exe -u http://localhost:3000 -tags vulnlab,sqli,xss,ssrf -duc # JSON output for report .\nuclei_tool\nuclei.exe -u http://localhost:3000 -t .\docker-lab\nuclei-templates\ -j -o results.json -duc # Verbose mode (see all requests) .\nuclei_tool\nuclei.exe -u http://localhost:3000 -t .\docker-lab\nuclei-templates\ -v -duc