To catch a thief, or for self defense you got to think like one. Google announces Jarlsberg, a web application that allows its users to publish snippets of text and store assorted files. “Unfortunately,” Jarlsberg has multiple security bugs ranging from cross-site scripting and cross-site request forgery, to information disclosure, denial of service, and remote code execution. The goal of this codelab is to guide you through discovering some of these bugs and learning ways to fix them both in Jarlsberg and in general.

The codelab is organized by types of vulnerabilities. In each section, you’ll find a brief description of a vulnerability and a task to find an instance of that vulnerability in Jarlsberg. Your job is to play the role of a malicious hacker and find and exploit the security bugs. In this codelab, you’ll use both black-box hacking and white-box hacking.

Jarlsebrg is sure to get some hit from all levels of programmers.

More info: Jarlsberg Website

“First learn computer science and all the theory. Next develop a programming style. Then forget all that and just hack.”
–George Carrette