module_id string | title string | difficulty string | tags list | objectives list | environment dict | tasks list |
|---|---|---|---|---|---|---|
HTB-0001 | Penetration Testing Module 1 | Fundamental | [
"Enumeration",
"Exploitation",
"Scripting"
] | [
"Objective 1: zg0k5701EsL8uFsCxyKK",
"Objective 2: 1OysSCGPHUS9H419kHnA",
"Objective 3: T5y76jEUpA2Sei3P1Wya",
"Objective 4: tFe75d9uxlRzaN4uubdP",
"Objective 5: TW4sbHMUfY81OUO48e84"
] | {
"os": "Kali Linux",
"tools": [
"john",
"metasploit",
"hydra",
"nmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 7N7AuvFYL6xJDItxb8OIFka5KdUZfISF1ivYG9aaR3LpjU0yMxXbq9Sq861wigVvi021vckVdmrnoSBAqLS1eALonAiPZCKSLWbnaUTD5vf826OsLuLovDL9l0N2IALhnkosuDMXuvWrgnCMkqNbP7",
"expected_output": "Expected output 1: MXZNhlN5nd0a64c8mdP8567Ng663vS",
"explanation": "Explanation 1: A4t... |
HTB-0002 | Penetration Testing Module 2 | Intermediate | [
"Enumeration",
"Reverse Engineering",
"Linux"
] | [
"Objective 1: r7FV2dvK1MHm2LkEzR3o",
"Objective 2: R9C1B44ftGLXMGGceIid",
"Objective 3: 2BXsZAY45rQKIpYOhUxV",
"Objective 4: RFCUpQJmtZthOxdKJ9o2",
"Objective 5: ESp9Ce3K7WgEb9NcaZCB"
] | {
"os": "Kali Linux",
"tools": [
"john",
"netcat",
"metasploit",
"sqlmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 4iEqeYW4KDe9QMlmA0owm0XNEYMnP2DvbGXCEet9rO3m19hRNhFLTf9INFzn1DOwGXLfBCwtWosXQMdFVEZS3gtkPnk1cCTxChGa8ANN15iPgYLr2MZSzEblz7qUHpcBwUay77sYWTvJ5ReKXe6P21",
"expected_output": "Expected output 1: 0TepombSvKRn3C4sPRYADCoqetRIwg",
"explanation": "Explanation 1: J5S... |
HTB-0003 | Penetration Testing Module 3 | Intermediate | [
"Reverse Engineering",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: CGMDo72pA9qQ5TOfxFn2",
"Objective 2: YDcptJerOJSK0Qck2HWa",
"Objective 3: OBidxpXdUZdC4evh5LLD",
"Objective 4: XbMvhnJWHCwgN8NynKlp",
"Objective 5: xL5SCyi9xA6cH9x4mVhp"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"nmap",
"sqlmap",
"metasploit",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Tw9R1iVBUt5b1PemHmzXlTjcfA7jARCg5AwjuJi01IRE2t5px2HP1YBIsdaIHmqoiS9R480ROcHeoST9y5juRAEloJ1To9qlDdpmPKt6TJkQjtX4nBltyQlRv25zeN0E1pk4g12HCknHtAfdAoucEO",
"expected_output": "Expected output 1: NH5zEbNksXepK9GWZtQYiniurhqRgs",
"explanation": "Explanation 1: 2xd... |
HTB-0004 | Penetration Testing Module 4 | Intermediate | [
"Linux",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: ofNPh3aJxq8T1O2l0LDq",
"Objective 2: 67Fn2u97th4d5EGrnPVc",
"Objective 3: wq7AOFwsduZxF9pGUuWU",
"Objective 4: T1oHOav82TUzrY6EuAxv",
"Objective 5: 4Bwyu5bw9O5jueK2q9vK"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"sqlmap",
"john",
"gobuster",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: IW9djy4n7VVU8pwXdsGny6hxu1OWOVy0fzo4ep4tMEZdxLWazrEqFqroEaVimtDZUPOvjEVRGXydOH9gvl3WQz8D95JFbf72hagIwcDHgLlkZqekkSb1q4axmqb7KcvvceC9AvEfAA54GLZILD7uud",
"expected_output": "Expected output 1: 6mTqrdQOiaDcRLGmRdGj8cGLnvJGRu",
"explanation": "Explanation 1: R8Q... |
HTB-0005 | Penetration Testing Module 5 | Advanced | [
"Privilege Escalation",
"Scripting",
"Windows"
] | [
"Objective 1: WsfDfKrmvWLV3MYbf9n4",
"Objective 2: PoW4SE2MP7VjfT5TPuSc",
"Objective 3: bC8TYTCeKoRgKCxAgDkJ",
"Objective 4: cvI1q3WhcEnuRczuGqqn",
"Objective 5: 4GOion5acgIazigGgNuS"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"gobuster",
"nikto",
"metasploit",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: czhIO8Cbp2JMsRFjmHZ1nzwbulqyYUAMmiYk0QOY0Gtka3jfH62nePq5mJmkZgP0ExoQpAaGwzWpC2CAdAy6A8zSrEfZ24893jFNdjKMyvAFWaf2ZvaEd9e6gzGIkgxubUbkK8x7SGYJLBUyjQF0QM",
"expected_output": "Expected output 1: OzRifxSgRIAQ6jEZgjI2uFpHzDUUE2",
"explanation": "Explanation 1: mom... |
HTB-0006 | Penetration Testing Module 6 | Intermediate | [
"Privilege Escalation",
"Reverse Engineering",
"Scripting"
] | [
"Objective 1: z90bHqEWPBVMrADJBytF",
"Objective 2: tsR4vfESy2IBeuRSZHVB",
"Objective 3: 1Vm9nRM8oofjO0zv9h9S",
"Objective 4: v7obZqLkDgCRxGqEiebp",
"Objective 5: QKaZgWX3W34M3seYJL7M"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"nikto",
"wireshark",
"sqlmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: TkswoyMFxr3oGIWxcbZSQSOeNHh5huEyddWrZ3mgha7hQPwNrGqt7wL5L5nCPVJbJj6oZDnNxN4OUt1B5dYNrUizhWqWjUmVD5oKhGio25zUo1tAF0v8Vut8EAEvPX1OEfkdCAEJN5PboPY5O53QOQ",
"expected_output": "Expected output 1: xqWWMnsGYY2MKcPLog9WGWhjCGbp5E",
"explanation": "Explanation 1: XTL... |
HTB-0007 | Penetration Testing Module 7 | Advanced | [
"Privilege Escalation",
"Windows",
"Networking"
] | [
"Objective 1: Xhj6QK04Rha4vBD2rcM5",
"Objective 2: GoWBk7EEu6tg7LQUHIsX",
"Objective 3: e9SgpvclYq70qgm5TQyw",
"Objective 4: nRq95uVw1Ut9pHbqELCB",
"Objective 5: IE7yvf5GvizAQh5Axy8y"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"hydra",
"metasploit",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: I31soOo8mnEkuBt0FewqhDhLCbUvlz28EyOAoDQY4Ks2IaoYMRNpZEs10mAF8g5T2plbeMggUAKqwDlhdOmaxUjbPvm4OMJ6OuhqR9KoLD6KOrQeA0VVqXNKUZWeQ7rHtvbu0zTDlt9VZ7CtA8HrHz",
"expected_output": "Expected output 1: uzqDXhf6VIJ1Kb7XluxH83OduSiU9P",
"explanation": "Explanation 1: BfR... |
HTB-0008 | Penetration Testing Module 8 | Advanced | [
"Privilege Escalation",
"Enumeration",
"Web"
] | [
"Objective 1: LWnRufNNz5g0bWT4Nevb",
"Objective 2: INXyZrOXk6Dp7iSzPEFe",
"Objective 3: ph1kTHCc4HI6apkCf1YT",
"Objective 4: GJEFiAydjN4TymKK50cF",
"Objective 5: 26jl4wLOXGoyVTlIe7zq"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"hydra",
"burpsuite",
"wireshark",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: lou8eZMjy9HJIoYMtpSZU5z72l2bRs9LNltUbBU5WDWM9wjcafKY8pQSleAmC3bpTI0ro7ryIGeaIvCXsYuO7zsIHrGRvWYEGriwE0tCiJxkhXNrn64V6POS6UBsBmciU4lZgyE6jiomoHlHYiqn6A",
"expected_output": "Expected output 1: iPExUK7KdVdkPD8YpIOxUrsQPuOjll",
"explanation": "Explanation 1: ggg... |
HTB-0009 | Penetration Testing Module 9 | Intermediate | [
"Scripting",
"Exploitation",
"Linux"
] | [
"Objective 1: 7rYlGz4ltR9trR9dnLyj",
"Objective 2: w6JIoRpSMsTWfpJ7N8nZ",
"Objective 3: uFINy8bTjCJuvlMwqa5P",
"Objective 4: UHhyNprf7qFWNDFu3L07",
"Objective 5: fThqUaqKLTcdQQeEyYqV"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"wireshark",
"hydra",
"nmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: SmimDT5zUFgpWqQQWhPHtzmxvBzwysLgBzPxtzLMn3xtpazvOw5jWHdDQEf89A1VhM6SCu7SxoBNGzBHDUFLPmfFYxMdS47y8rUeCbxAEph5kMJy9fEhcuUugIupj3ZVEUSzUAJXYHD2TRYSRYMMe6",
"expected_output": "Expected output 1: 2oPho184t5hTGCCMv4mZ5VpDhywbu0",
"explanation": "Explanation 1: JNv... |
HTB-0010 | Penetration Testing Module 10 | Fundamental | [
"Networking",
"Web",
"Enumeration"
] | [
"Objective 1: 3yv1dYy6AReJSfJCR3S2",
"Objective 2: V1i52SVcwr8Fsratbg49",
"Objective 3: Sd2LhBET19zn0bSjjjFJ",
"Objective 4: rAmqFhp2D87QMitCERgC",
"Objective 5: h8Wsxhr8xPnVGnrQUdkj"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"hydra",
"netcat",
"metasploit",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: S0mID8UqflsF1WxywHLcRtXYWmnkERtMgCVxQMY78fltxorBMZK4yhHblbVTNc3EKib8mQbvu8FKd03EI7aED6TZJsbSFO5M4Z9mx2kDYBYMt2sFbKbjqypAUeQ9UBRY0jRqwuBwBsUD3WU1gOACtL",
"expected_output": "Expected output 1: m1HctxKSxCPd3ylZ4neCZeqWBOtdoX",
"explanation": "Explanation 1: rZm... |
HTB-0011 | Penetration Testing Module 11 | Advanced | [
"Linux",
"Exploitation",
"Privilege Escalation"
] | [
"Objective 1: DpNuOMePPP3oMWkZaOxA",
"Objective 2: gmUPY1a05ygXj8B1XDv8",
"Objective 3: teAgPOyhUmydHrnQdtst",
"Objective 4: ubLnmrvqwaVYQajB4Ih3",
"Objective 5: QvZ5PmUde9EBpzdzOlXO"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"wireshark",
"hydra",
"john",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: jpPHwAH5YUPvCOxrpUFxiOPpv6S4WRx8FqRqEE9F7a3TfVmCP58zTJdUejdSHbwTBEBKLdsu5BrFjv4680iLidFjBtrem4Kcehr0JN3nv4LUVOCQBKOp2scKcUncxtp8Jb2tFUFmResToxOEgs5Ts2",
"expected_output": "Expected output 1: 0Hb2NaAws9PouuybQRECA2EfOFzqet",
"explanation": "Explanation 1: JgK... |
HTB-0012 | Penetration Testing Module 12 | Intermediate | [
"Reverse Engineering",
"Networking",
"Privilege Escalation"
] | [
"Objective 1: NjeagCHYr1oOdIA873dX",
"Objective 2: cLO4CarpJpgbrz3NzpDu",
"Objective 3: ZmEPoWk8AkP5YRTIEiAt",
"Objective 4: Bef2OCv1MqgwRcbSKb8c",
"Objective 5: eBfYNxaUVysYOz4r697h"
] | {
"os": "Ubuntu 20.04",
"tools": [
"hydra",
"metasploit",
"nikto",
"nmap",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: uN4yDF9HElsLeom11UHXcxcy38bCWR4lqvTvirHgOBC3MZeTT80hbJEM1K5LROSb8AbEljt0DU8c9PLgh6U3JxTIAgFcYmeBDwPPKd3b5zXFhyJxRXZWZPV7FJfY4RKbndawxF8TMRInFdUdZqle2Q",
"expected_output": "Expected output 1: OsOuqM8H1xtwbqcodv2bI7mALlYbNH",
"explanation": "Explanation 1: Uep... |
HTB-0013 | Penetration Testing Module 13 | Advanced | [
"Windows",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: yQUBMpWEAQX54h3H9CRZ",
"Objective 2: QJIaegrs30E5oDosZ7ZX",
"Objective 3: S5JLRY0Xr5aNzWig7HWD",
"Objective 4: ZV8rsBJDmIKXDz6uYuB4",
"Objective 5: 0EMgeCRJ23Bxty7VYwNJ"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"gobuster",
"metasploit",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: DvenKOsoi7t2D78eTQrqh4TDfy7Q5UEmZThiIPah0Si4X5l7D6SxdG1c55KkXUAmOWKoqIRcmrQo3TrXexGEBWqXXa4xJdgyP8lo5tWJ1HY4E3tFSN4yppyHqn5NImOXSM9QdqP2qpQwIZJ0qAtj6T",
"expected_output": "Expected output 1: zprl3oRnKhZfIB7mTT5FU53qSuZ93d",
"explanation": "Explanation 1: 69E... |
HTB-0014 | Penetration Testing Module 14 | Intermediate | [
"Web",
"Exploitation",
"Linux"
] | [
"Objective 1: R52VUw92T5unoUh7fWCs",
"Objective 2: wBy7kkLx0Xcz6mSkGLnD",
"Objective 3: 55OhlI7ZM4Wni3uGbjU5",
"Objective 4: ugi3TwgB82pqqW2kOYbK",
"Objective 5: PzqUmPD66ISMyyqEajML"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"wireshark",
"sqlmap",
"hydra",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: TlDJRWEE9IYK6mCATfrc6jwmEQJ1Ezu1jMorJF9JfrerAJhRyePwjgKy3iod9sgxCJhczuVfM7MOOwQG0W8SzsLPenWyIjcsaOxQKIan2pWHbBINJ7PdXebk3WBmWvp52p1bXYPo3pLC11OveK4FOn",
"expected_output": "Expected output 1: ggX39mbKWeYvMxIDiatH98xO7bmjma",
"explanation": "Explanation 1: ohH... |
HTB-0015 | Penetration Testing Module 15 | Intermediate | [
"Privilege Escalation",
"Linux",
"Networking"
] | [
"Objective 1: 7N0UZTGnW6U80LA7K7XG",
"Objective 2: tPoh78y0iY1MaTbFkzSF",
"Objective 3: pTJKzNnPp3b58qJh98f3",
"Objective 4: jpuMwy6roXEcS0wrZioc",
"Objective 5: UkpTlWOO7JeY9PV27x74"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"sqlmap",
"burpsuite",
"nmap",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: twlGEvoiw39meItNNpZyf37lnJ9VqhZlGHD4LpmhGkvWfSA7oBscq8a7155XsKEamsfABWxkRRKlrz40Lxh1F0IGGasgVnz1C2gw4KZnEc3TqLenaHQyr4cwCDEd8igVy96Glxfn21rfIpFa0ItQ8M",
"expected_output": "Expected output 1: NS31LT71mFhvvJd1EGjNOe0dFS2LWg",
"explanation": "Explanation 1: YZ5... |
HTB-0016 | Penetration Testing Module 16 | Advanced | [
"Linux",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: f7lWBkMbB3MIZOL2mAJv",
"Objective 2: vYTLwU4RsPHm7HTt1PmY",
"Objective 3: 0WpLpEnv9XHLS2nfpDyZ",
"Objective 4: jEKbbu2LgZYKXSLSZ7Ug",
"Objective 5: MO2SptNqIQB9bhma3G8H"
] | {
"os": "Kali Linux",
"tools": [
"john",
"nikto",
"metasploit",
"wireshark",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: DY5GK7979Z5ZGDVPVJkoirFluan1Z8c1aXmgTNwZqRbFzqVg5nVuZ2nf4IL4w3vco8tZZmtPLyWMneLQK5SJLJ7mRcIsAhCDnwi83ixlsZLckI9oGNb8yupVV56FcVbvU6Ca2Y7vO083laDN8UNLX2",
"expected_output": "Expected output 1: C1mC1p4d5uWaVA5PQtggEROWctKz8c",
"explanation": "Explanation 1: xuY... |
HTB-0017 | Penetration Testing Module 17 | Advanced | [
"Privilege Escalation",
"Linux",
"Reverse Engineering"
] | [
"Objective 1: wt9tz2PxZOWiRPKimdEY",
"Objective 2: YuzY7yBst1tRAFVP5uir",
"Objective 3: tnVyO6NoBhfKl2g7ecHw",
"Objective 4: 2douncFJxPNOSEM7mnqU",
"Objective 5: brGWgihrQI9m91vFpnrH"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"netcat",
"nikto",
"john",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Tz5XYYebWWxgvoUIEkrqQxyhvFWw1lkeouy7YQ27E2s1A159zo8y0FM8j0jIku1t0AKUNPwxOllKs7nHnNe2Gf8EHc8X3F6VB0oD0ffPi24oAcCIB0OUOPkTUX05rw9bAsu47LztfJYCOVLCTSEs2E",
"expected_output": "Expected output 1: cY4ylwQjfYeBEMXh6fzaY5WpUqn79r",
"explanation": "Explanation 1: TtC... |
HTB-0018 | Penetration Testing Module 18 | Advanced | [
"Scripting",
"Windows",
"Reverse Engineering"
] | [
"Objective 1: OQMg0gacpVfGPk4G31rO",
"Objective 2: FtG1gxE0A7GhTPuejxhy",
"Objective 3: R9SnqpkSwsqksunBZomy",
"Objective 4: iK3Yt6NIySz7vU15mKAu",
"Objective 5: BTqkq6LKfxNqkmp25LUM"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"john",
"burpsuite",
"wireshark",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: yB9A7Dz8Pw254O04mDBfoLaghpDlmulDU6CQXsS8Mg4m5cdseUtEWe58vwxdQeqzLAzl2SJWk9Cv38Cmt0gJbp6NF7BxzwN6pFHHXdYiI6WZk8WkQXMi6t9ljedOhXvnu45uJJ0ysChT8PerXLUj2a",
"expected_output": "Expected output 1: ZkGBanjKrYum4wsfHVxO372dwsmfgR",
"explanation": "Explanation 1: 4EY... |
HTB-0019 | Penetration Testing Module 19 | Advanced | [
"Web",
"Privilege Escalation",
"Windows"
] | [
"Objective 1: eRFVoDikA8nGOjnnwWPZ",
"Objective 2: 6g1bfJ1rHu1VMAhPs4bK",
"Objective 3: oPUvdlkeh4MTKeFAtlX7",
"Objective 4: 0bsG55hruinNxE31COp1",
"Objective 5: nbGmiK7q3BTnE8AYRNUV"
] | {
"os": "Kali Linux",
"tools": [
"john",
"nmap",
"sqlmap",
"hydra",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: rkHbnUom7hgyf3ekVQJZfSH69Ln3AulOaUOlae7ispMwE8yjq7uuXSo6L6YvZK9gJKLMmF0Gu1HfObZpb1Yk68T7KbqK0t1BQ8wF87K4hlJgN2sJueERuwNPc0t9LnAHl2z5eTUuKpHEZ15A4isp5W",
"expected_output": "Expected output 1: kutbD6PPo3X6H2Vkkz9aD6yyJ1jmSW",
"explanation": "Explanation 1: Zk8... |
HTB-0020 | Penetration Testing Module 20 | Advanced | [
"Exploitation",
"Windows",
"Scripting"
] | [
"Objective 1: Z9lH9ne6M7ltfbthWSnu",
"Objective 2: kBqGJ8Q32W9ZOpSIwVmG",
"Objective 3: nlbeS8IAWIhL8djsgbuj",
"Objective 4: KxqH9X6dp5HRu6QIKcLr",
"Objective 5: JW1g7GciL2sb97T18PGM"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"sqlmap",
"burpsuite",
"wireshark",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: BbPxSWkmt1BqOyamdoYCT53ZhGqo1IsqqBFMvFxKMl4Yv0ggFTLNk1qma1qevOooHJY94AbzOps7p1T9XE7oMJ8ZE5pqVqueUsIMGG74HdSkTW2dM95lqETkDjcUlLBH1PQVZhleLoE9B1vqX9Tmay",
"expected_output": "Expected output 1: tsX00796RaMIPCetIJjrQgNlkRqKu8",
"explanation": "Explanation 1: IRz... |
End of preview. Expand in Data Studio
No dataset card yet
- Downloads last month
- 6