portswigger-all-labs

Complete PortSwigger Web Security Academy Lab Writeups Detailed, categorized solutions for every lab — from APPRENTICE to EXPERT — covering all 30 vulnerability types.

View on GitHub

Labs Covered

This write-up focuses on the following PRACTITIONER-level labs from the PortSwigger Web Security Academy related to Essential Skills:

Discovering vulnerabilities quickly with targeted scanning
This lab demonstrates how to use targeted scanning techniques to identify vulnerabilities more efficiently by focusing on likely problem areas.

Scanning non-standard data structures
This lab shows how to identify and scan non-standard or complex data structures that may not be handled effectively by typical scanning tools.


LAB 1 - Discovering vulnerabilities quickly with targeted scanning

Lab Description

image

Solution

1. Identifying a Suspicious URL


2. Run Active Scan

image


3. Analyzing the Scanner Finding

image


4. Send Request to Repeater

image


5. Injecting Malicious Payload

Payload:

<foo xmlns:xi="http://www.w3.org/2001/XInclude">
  <xi:include parse="text" href="file:///etc/passwd"/>
</foo>

image

image


6. Analyze the Response

image


Lab Solved

You’ve confirmed that the application is vulnerable to XInclude-based file inclusion, and you were able to read arbitrary files from the server using a crafted XML payload.


LAB 2 - Scanning non-standard data structures

Lab Description

image

Solution

1. Install Required Extensions

image


2. Login as Wiener


3. Send Authenticated Request to Repeater

image



5. Manual Fuzzing

image


6. Send to Intruder

image


7. Scan for XSS Insertion Point

image

Doing Insertion point scan

image

We have find Cross-site scripting store of insertion point

image


8. Craft XSS Payload

image

Decoded payload

image


9. Create Payload for Collaborator

image

image


10. Submit Payload and Wait


image

image


image


13. Impersonate Administrator

image


14. Reload and Delete Carlos


Lab Solved