BRUTE FORCE IS NOT ALLOWED!
(Applies only to the Dojo challenge page itself)
Are you interested in doing your own Dojo challenge? Send us a message on Twitter!
Those rules applies for each challenge:
The challenges are drawn from real-life vulnerabilities, if you manage to solve a challenge, you must create a report explaining the logic behind your solution: "How did you solve the challenge?"
We will publish the best write-up report along the winners list for each challenge session on our blog (See an example here)
Swag pack with Yeswehack goodies
We fiercely protect your privacy, no personal information from your profile will ever be used by anyone, except for individual exchanges between you and YesWeHack for the purpose of this challenge and for awarding gifts.
The YesWeHack Dojo is a unique training and learning tool, it allows to witness how code is manipulated by inputs and parameters in real time.
The YesWeHack Dojo also can be used to rebuild complex exploitation scenarios from scratch and share them.
We have crafted nifty challenges using the Dojo platform, that we will initiate from the YesWeHack twitter account, stay tuned.
On our blog, we describe how you can use the platform effectively with all the features offered.
Scope Type | Scope Name |
---|---|
web_application | https://dojo-yeswehack.com/challenge-of-the-month/dojo-39 |
Scope Type | Scope Name |
---|---|
undefined | Everything that's out of the scope root URL |
Firebounty have crawled on 2020-11-12 the program YesWeHack Dojo on the platform Yeswehack.
FireBounty © 2015-2025