The first Scenario stage provides the description of the exercise, as well as its duration, difficulty level, and score.
You can click on the highlighted text in the “Learn More about…” section to access the vulnerability knowledge base, which provides more details about the vulnerability and best practices to resolve it.
You can then move on to the Setup stage by clicking on the Continue button.
You can always come back to access the content of a stage you have worked on previously.
Note: The stage number will change from 1 to a Blue tick, indicating you have completed this stage.
Step 2:
Follow the Setup stage instructions to run the code and start/run the vulnerable application. Once the vulnerable application or code has begun, click on the Continue button to progress to the Hack stage.
Step 3:
While this stage is optional, we highly recommend that you try to execute the steps to exploit the vulnerability. It will give you a better understanding of the attack from an adversary’s perspective.
Read the instructions in the Hack stage to learn how to execute the hack. If you get stuck along the way, hints are available to point you in the right direction. To read a hint, click on the Free Hint button.
Once you have successfully exploited the vulnerability, click on the Continue button to move on to the Remediate stage.
Note: Points are not deducted when using hints in the Exploit stage.
Step 4:
Read the instructions in the Remediate stage to know which code changes you need to make. If you get stuck along the way, hints are available to point you in the right direction. To read a hint, click on the Hint button.
Note: Points will be deducted when using a hint during the Remediate stage.
Once you have made the necessary changes, run the code again as per the instructions in the Setup stage, and then click on the Continue button.
Step 5:
If your changes have fixed the vulnerability, the stage number changes from 4 to a Blue Tick, and a popup window will appear, indicating that you have successfully completed the Lab.
From here, you can click on Stop Exercise to be taken back to the Completed Labs page, or you can click on Cancel to close the popup window and then test the hack to see how your changes have fixed the vulnerability.
To exit the Lab, you can either click on the Continue button in the Remediate stage or click on the Power Button located in the bottom-left corner of the screen.
Step 6:
If your changes to the code have not fixed the vulnerability, a status message will appear, indicating the code is still vulnerable.
The Lab will alert you if your changes have broken any functionality. If this is the case, a Broken Functionality message will be displayed with an option to restore the code to its initial state.
When you click on restore, you will be requested to close and reopen the IDE. On reopening the IDE, you will be presented with the code from the beginning of the Lab.
You can now try to fix the vulnerability again.
Important: In the event you Restore your code, stage numbers 2 and 4 will change into a Red cross, indicating that the code is not running. You must first complete stage 2 Setup then move to stage 4 Remediation.