Hacker Contest Challenge of Summer Semester 2025: Sample Solution online

4. June 2025

In the summer semester 2025, the popular “Hacker Contest” at the Technical University of Darmstadt (TU) and Darmstadt University of Applied Sciences (h_da) will once again place the students' hacking skills at its center. In the course, participants gain valuable insights into the world of IT security and learn how vulnerabilities in networks and systems can be identified in the PentestLab of the usd HeroLab.

As every semester, those who wanted to take part had to complete the Hacker Contest Challenge: This time, the goal was to identify and exploit security vulnerabilities in a deployed web application and combine them into a logical attack chain to gain root access to the Docker container.

Our experts from the usd HeroLab have published this year's task and a sample solution in their LabNews. You want to know what the challenge looked like in summer semester 2025 or what details you missed?

Also interesting:

Security Advisories on PRTG Network Monitor

Security Advisories on PRTG Network Monitor

The pentest professionals at usd HeroLab examined the PRTG Network Monitor web application as part of web application pentests and identified several vulnerabilities. Two vulnerabilities relate to cross-site scripting (XSS), which allows attackers to inject JavaScript...

PCI Secure Software Standard v2.0: What You Should Know

PCI Secure Software Standard v2.0: What You Should Know

On 15 January 2026, the PCI Security Standards Council (PCI SSC) released version 2.0 of the PCI Secure Software Standard. This is the first comprehensive revision since the introduction of the standard. Insight into the Key Changes The new version streamlines the...

Part-IS and ISO 27001: How to Leverage Synergies for Your Compliance

Part-IS and ISO 27001: How to Leverage Synergies for Your Compliance

On 22 February 2026, the EU Regulation Part-IS for aviation organizations will come into force. They must manage information security risks in a way that best protects civil aviation safety. Many already rely on an ISMS according to ISO 27001 – but is that enough for...

Categories

Categories