module_id string | title string | difficulty string | tags list | objectives list | environment dict | tasks list |
|---|---|---|---|---|---|---|
HTB-0001 | Penetration Testing Module 1 | Fundamental | [
"Enumeration",
"Exploitation",
"Scripting"
] | [
"Objective 1: zg0k5701EsL8uFsCxyKK",
"Objective 2: 1OysSCGPHUS9H419kHnA",
"Objective 3: T5y76jEUpA2Sei3P1Wya",
"Objective 4: tFe75d9uxlRzaN4uubdP",
"Objective 5: TW4sbHMUfY81OUO48e84"
] | {
"os": "Kali Linux",
"tools": [
"john",
"metasploit",
"hydra",
"nmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 7N7AuvFYL6xJDItxb8OIFka5KdUZfISF1ivYG9aaR3LpjU0yMxXbq9Sq861wigVvi021vckVdmrnoSBAqLS1eALonAiPZCKSLWbnaUTD5vf826OsLuLovDL9l0N2IALhnkosuDMXuvWrgnCMkqNbP7",
"expected_output": "Expected output 1: MXZNhlN5nd0a64c8mdP8567Ng663vS",
"explanation": "Explanation 1: A4t... |
HTB-0002 | Penetration Testing Module 2 | Intermediate | [
"Enumeration",
"Reverse Engineering",
"Linux"
] | [
"Objective 1: r7FV2dvK1MHm2LkEzR3o",
"Objective 2: R9C1B44ftGLXMGGceIid",
"Objective 3: 2BXsZAY45rQKIpYOhUxV",
"Objective 4: RFCUpQJmtZthOxdKJ9o2",
"Objective 5: ESp9Ce3K7WgEb9NcaZCB"
] | {
"os": "Kali Linux",
"tools": [
"john",
"netcat",
"metasploit",
"sqlmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 4iEqeYW4KDe9QMlmA0owm0XNEYMnP2DvbGXCEet9rO3m19hRNhFLTf9INFzn1DOwGXLfBCwtWosXQMdFVEZS3gtkPnk1cCTxChGa8ANN15iPgYLr2MZSzEblz7qUHpcBwUay77sYWTvJ5ReKXe6P21",
"expected_output": "Expected output 1: 0TepombSvKRn3C4sPRYADCoqetRIwg",
"explanation": "Explanation 1: J5S... |
HTB-0003 | Penetration Testing Module 3 | Intermediate | [
"Reverse Engineering",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: CGMDo72pA9qQ5TOfxFn2",
"Objective 2: YDcptJerOJSK0Qck2HWa",
"Objective 3: OBidxpXdUZdC4evh5LLD",
"Objective 4: XbMvhnJWHCwgN8NynKlp",
"Objective 5: xL5SCyi9xA6cH9x4mVhp"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"nmap",
"sqlmap",
"metasploit",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Tw9R1iVBUt5b1PemHmzXlTjcfA7jARCg5AwjuJi01IRE2t5px2HP1YBIsdaIHmqoiS9R480ROcHeoST9y5juRAEloJ1To9qlDdpmPKt6TJkQjtX4nBltyQlRv25zeN0E1pk4g12HCknHtAfdAoucEO",
"expected_output": "Expected output 1: NH5zEbNksXepK9GWZtQYiniurhqRgs",
"explanation": "Explanation 1: 2xd... |
HTB-0004 | Penetration Testing Module 4 | Intermediate | [
"Linux",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: ofNPh3aJxq8T1O2l0LDq",
"Objective 2: 67Fn2u97th4d5EGrnPVc",
"Objective 3: wq7AOFwsduZxF9pGUuWU",
"Objective 4: T1oHOav82TUzrY6EuAxv",
"Objective 5: 4Bwyu5bw9O5jueK2q9vK"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"sqlmap",
"john",
"gobuster",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: IW9djy4n7VVU8pwXdsGny6hxu1OWOVy0fzo4ep4tMEZdxLWazrEqFqroEaVimtDZUPOvjEVRGXydOH9gvl3WQz8D95JFbf72hagIwcDHgLlkZqekkSb1q4axmqb7KcvvceC9AvEfAA54GLZILD7uud",
"expected_output": "Expected output 1: 6mTqrdQOiaDcRLGmRdGj8cGLnvJGRu",
"explanation": "Explanation 1: R8Q... |
HTB-0005 | Penetration Testing Module 5 | Advanced | [
"Privilege Escalation",
"Scripting",
"Windows"
] | [
"Objective 1: WsfDfKrmvWLV3MYbf9n4",
"Objective 2: PoW4SE2MP7VjfT5TPuSc",
"Objective 3: bC8TYTCeKoRgKCxAgDkJ",
"Objective 4: cvI1q3WhcEnuRczuGqqn",
"Objective 5: 4GOion5acgIazigGgNuS"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"gobuster",
"nikto",
"metasploit",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: czhIO8Cbp2JMsRFjmHZ1nzwbulqyYUAMmiYk0QOY0Gtka3jfH62nePq5mJmkZgP0ExoQpAaGwzWpC2CAdAy6A8zSrEfZ24893jFNdjKMyvAFWaf2ZvaEd9e6gzGIkgxubUbkK8x7SGYJLBUyjQF0QM",
"expected_output": "Expected output 1: OzRifxSgRIAQ6jEZgjI2uFpHzDUUE2",
"explanation": "Explanation 1: mom... |
HTB-0006 | Penetration Testing Module 6 | Intermediate | [
"Privilege Escalation",
"Reverse Engineering",
"Scripting"
] | [
"Objective 1: z90bHqEWPBVMrADJBytF",
"Objective 2: tsR4vfESy2IBeuRSZHVB",
"Objective 3: 1Vm9nRM8oofjO0zv9h9S",
"Objective 4: v7obZqLkDgCRxGqEiebp",
"Objective 5: QKaZgWX3W34M3seYJL7M"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"nikto",
"wireshark",
"sqlmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: TkswoyMFxr3oGIWxcbZSQSOeNHh5huEyddWrZ3mgha7hQPwNrGqt7wL5L5nCPVJbJj6oZDnNxN4OUt1B5dYNrUizhWqWjUmVD5oKhGio25zUo1tAF0v8Vut8EAEvPX1OEfkdCAEJN5PboPY5O53QOQ",
"expected_output": "Expected output 1: xqWWMnsGYY2MKcPLog9WGWhjCGbp5E",
"explanation": "Explanation 1: XTL... |
HTB-0007 | Penetration Testing Module 7 | Advanced | [
"Privilege Escalation",
"Windows",
"Networking"
] | [
"Objective 1: Xhj6QK04Rha4vBD2rcM5",
"Objective 2: GoWBk7EEu6tg7LQUHIsX",
"Objective 3: e9SgpvclYq70qgm5TQyw",
"Objective 4: nRq95uVw1Ut9pHbqELCB",
"Objective 5: IE7yvf5GvizAQh5Axy8y"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"hydra",
"metasploit",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: I31soOo8mnEkuBt0FewqhDhLCbUvlz28EyOAoDQY4Ks2IaoYMRNpZEs10mAF8g5T2plbeMggUAKqwDlhdOmaxUjbPvm4OMJ6OuhqR9KoLD6KOrQeA0VVqXNKUZWeQ7rHtvbu0zTDlt9VZ7CtA8HrHz",
"expected_output": "Expected output 1: uzqDXhf6VIJ1Kb7XluxH83OduSiU9P",
"explanation": "Explanation 1: BfR... |
HTB-0008 | Penetration Testing Module 8 | Advanced | [
"Privilege Escalation",
"Enumeration",
"Web"
] | [
"Objective 1: LWnRufNNz5g0bWT4Nevb",
"Objective 2: INXyZrOXk6Dp7iSzPEFe",
"Objective 3: ph1kTHCc4HI6apkCf1YT",
"Objective 4: GJEFiAydjN4TymKK50cF",
"Objective 5: 26jl4wLOXGoyVTlIe7zq"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"hydra",
"burpsuite",
"wireshark",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: lou8eZMjy9HJIoYMtpSZU5z72l2bRs9LNltUbBU5WDWM9wjcafKY8pQSleAmC3bpTI0ro7ryIGeaIvCXsYuO7zsIHrGRvWYEGriwE0tCiJxkhXNrn64V6POS6UBsBmciU4lZgyE6jiomoHlHYiqn6A",
"expected_output": "Expected output 1: iPExUK7KdVdkPD8YpIOxUrsQPuOjll",
"explanation": "Explanation 1: ggg... |
HTB-0009 | Penetration Testing Module 9 | Intermediate | [
"Scripting",
"Exploitation",
"Linux"
] | [
"Objective 1: 7rYlGz4ltR9trR9dnLyj",
"Objective 2: w6JIoRpSMsTWfpJ7N8nZ",
"Objective 3: uFINy8bTjCJuvlMwqa5P",
"Objective 4: UHhyNprf7qFWNDFu3L07",
"Objective 5: fThqUaqKLTcdQQeEyYqV"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"wireshark",
"hydra",
"nmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: SmimDT5zUFgpWqQQWhPHtzmxvBzwysLgBzPxtzLMn3xtpazvOw5jWHdDQEf89A1VhM6SCu7SxoBNGzBHDUFLPmfFYxMdS47y8rUeCbxAEph5kMJy9fEhcuUugIupj3ZVEUSzUAJXYHD2TRYSRYMMe6",
"expected_output": "Expected output 1: 2oPho184t5hTGCCMv4mZ5VpDhywbu0",
"explanation": "Explanation 1: JNv... |
HTB-0010 | Penetration Testing Module 10 | Fundamental | [
"Networking",
"Web",
"Enumeration"
] | [
"Objective 1: 3yv1dYy6AReJSfJCR3S2",
"Objective 2: V1i52SVcwr8Fsratbg49",
"Objective 3: Sd2LhBET19zn0bSjjjFJ",
"Objective 4: rAmqFhp2D87QMitCERgC",
"Objective 5: h8Wsxhr8xPnVGnrQUdkj"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"hydra",
"netcat",
"metasploit",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: S0mID8UqflsF1WxywHLcRtXYWmnkERtMgCVxQMY78fltxorBMZK4yhHblbVTNc3EKib8mQbvu8FKd03EI7aED6TZJsbSFO5M4Z9mx2kDYBYMt2sFbKbjqypAUeQ9UBRY0jRqwuBwBsUD3WU1gOACtL",
"expected_output": "Expected output 1: m1HctxKSxCPd3ylZ4neCZeqWBOtdoX",
"explanation": "Explanation 1: rZm... |
HTB-0011 | Penetration Testing Module 11 | Advanced | [
"Linux",
"Exploitation",
"Privilege Escalation"
] | [
"Objective 1: DpNuOMePPP3oMWkZaOxA",
"Objective 2: gmUPY1a05ygXj8B1XDv8",
"Objective 3: teAgPOyhUmydHrnQdtst",
"Objective 4: ubLnmrvqwaVYQajB4Ih3",
"Objective 5: QvZ5PmUde9EBpzdzOlXO"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"wireshark",
"hydra",
"john",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: jpPHwAH5YUPvCOxrpUFxiOPpv6S4WRx8FqRqEE9F7a3TfVmCP58zTJdUejdSHbwTBEBKLdsu5BrFjv4680iLidFjBtrem4Kcehr0JN3nv4LUVOCQBKOp2scKcUncxtp8Jb2tFUFmResToxOEgs5Ts2",
"expected_output": "Expected output 1: 0Hb2NaAws9PouuybQRECA2EfOFzqet",
"explanation": "Explanation 1: JgK... |
HTB-0012 | Penetration Testing Module 12 | Intermediate | [
"Reverse Engineering",
"Networking",
"Privilege Escalation"
] | [
"Objective 1: NjeagCHYr1oOdIA873dX",
"Objective 2: cLO4CarpJpgbrz3NzpDu",
"Objective 3: ZmEPoWk8AkP5YRTIEiAt",
"Objective 4: Bef2OCv1MqgwRcbSKb8c",
"Objective 5: eBfYNxaUVysYOz4r697h"
] | {
"os": "Ubuntu 20.04",
"tools": [
"hydra",
"metasploit",
"nikto",
"nmap",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: uN4yDF9HElsLeom11UHXcxcy38bCWR4lqvTvirHgOBC3MZeTT80hbJEM1K5LROSb8AbEljt0DU8c9PLgh6U3JxTIAgFcYmeBDwPPKd3b5zXFhyJxRXZWZPV7FJfY4RKbndawxF8TMRInFdUdZqle2Q",
"expected_output": "Expected output 1: OsOuqM8H1xtwbqcodv2bI7mALlYbNH",
"explanation": "Explanation 1: Uep... |
HTB-0013 | Penetration Testing Module 13 | Advanced | [
"Windows",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: yQUBMpWEAQX54h3H9CRZ",
"Objective 2: QJIaegrs30E5oDosZ7ZX",
"Objective 3: S5JLRY0Xr5aNzWig7HWD",
"Objective 4: ZV8rsBJDmIKXDz6uYuB4",
"Objective 5: 0EMgeCRJ23Bxty7VYwNJ"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"gobuster",
"metasploit",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: DvenKOsoi7t2D78eTQrqh4TDfy7Q5UEmZThiIPah0Si4X5l7D6SxdG1c55KkXUAmOWKoqIRcmrQo3TrXexGEBWqXXa4xJdgyP8lo5tWJ1HY4E3tFSN4yppyHqn5NImOXSM9QdqP2qpQwIZJ0qAtj6T",
"expected_output": "Expected output 1: zprl3oRnKhZfIB7mTT5FU53qSuZ93d",
"explanation": "Explanation 1: 69E... |
HTB-0014 | Penetration Testing Module 14 | Intermediate | [
"Web",
"Exploitation",
"Linux"
] | [
"Objective 1: R52VUw92T5unoUh7fWCs",
"Objective 2: wBy7kkLx0Xcz6mSkGLnD",
"Objective 3: 55OhlI7ZM4Wni3uGbjU5",
"Objective 4: ugi3TwgB82pqqW2kOYbK",
"Objective 5: PzqUmPD66ISMyyqEajML"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"wireshark",
"sqlmap",
"hydra",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: TlDJRWEE9IYK6mCATfrc6jwmEQJ1Ezu1jMorJF9JfrerAJhRyePwjgKy3iod9sgxCJhczuVfM7MOOwQG0W8SzsLPenWyIjcsaOxQKIan2pWHbBINJ7PdXebk3WBmWvp52p1bXYPo3pLC11OveK4FOn",
"expected_output": "Expected output 1: ggX39mbKWeYvMxIDiatH98xO7bmjma",
"explanation": "Explanation 1: ohH... |
HTB-0015 | Penetration Testing Module 15 | Intermediate | [
"Privilege Escalation",
"Linux",
"Networking"
] | [
"Objective 1: 7N0UZTGnW6U80LA7K7XG",
"Objective 2: tPoh78y0iY1MaTbFkzSF",
"Objective 3: pTJKzNnPp3b58qJh98f3",
"Objective 4: jpuMwy6roXEcS0wrZioc",
"Objective 5: UkpTlWOO7JeY9PV27x74"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"sqlmap",
"burpsuite",
"nmap",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: twlGEvoiw39meItNNpZyf37lnJ9VqhZlGHD4LpmhGkvWfSA7oBscq8a7155XsKEamsfABWxkRRKlrz40Lxh1F0IGGasgVnz1C2gw4KZnEc3TqLenaHQyr4cwCDEd8igVy96Glxfn21rfIpFa0ItQ8M",
"expected_output": "Expected output 1: NS31LT71mFhvvJd1EGjNOe0dFS2LWg",
"explanation": "Explanation 1: YZ5... |
HTB-0016 | Penetration Testing Module 16 | Advanced | [
"Linux",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: f7lWBkMbB3MIZOL2mAJv",
"Objective 2: vYTLwU4RsPHm7HTt1PmY",
"Objective 3: 0WpLpEnv9XHLS2nfpDyZ",
"Objective 4: jEKbbu2LgZYKXSLSZ7Ug",
"Objective 5: MO2SptNqIQB9bhma3G8H"
] | {
"os": "Kali Linux",
"tools": [
"john",
"nikto",
"metasploit",
"wireshark",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: DY5GK7979Z5ZGDVPVJkoirFluan1Z8c1aXmgTNwZqRbFzqVg5nVuZ2nf4IL4w3vco8tZZmtPLyWMneLQK5SJLJ7mRcIsAhCDnwi83ixlsZLckI9oGNb8yupVV56FcVbvU6Ca2Y7vO083laDN8UNLX2",
"expected_output": "Expected output 1: C1mC1p4d5uWaVA5PQtggEROWctKz8c",
"explanation": "Explanation 1: xuY... |
HTB-0017 | Penetration Testing Module 17 | Advanced | [
"Privilege Escalation",
"Linux",
"Reverse Engineering"
] | [
"Objective 1: wt9tz2PxZOWiRPKimdEY",
"Objective 2: YuzY7yBst1tRAFVP5uir",
"Objective 3: tnVyO6NoBhfKl2g7ecHw",
"Objective 4: 2douncFJxPNOSEM7mnqU",
"Objective 5: brGWgihrQI9m91vFpnrH"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"netcat",
"nikto",
"john",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Tz5XYYebWWxgvoUIEkrqQxyhvFWw1lkeouy7YQ27E2s1A159zo8y0FM8j0jIku1t0AKUNPwxOllKs7nHnNe2Gf8EHc8X3F6VB0oD0ffPi24oAcCIB0OUOPkTUX05rw9bAsu47LztfJYCOVLCTSEs2E",
"expected_output": "Expected output 1: cY4ylwQjfYeBEMXh6fzaY5WpUqn79r",
"explanation": "Explanation 1: TtC... |
HTB-0018 | Penetration Testing Module 18 | Advanced | [
"Scripting",
"Windows",
"Reverse Engineering"
] | [
"Objective 1: OQMg0gacpVfGPk4G31rO",
"Objective 2: FtG1gxE0A7GhTPuejxhy",
"Objective 3: R9SnqpkSwsqksunBZomy",
"Objective 4: iK3Yt6NIySz7vU15mKAu",
"Objective 5: BTqkq6LKfxNqkmp25LUM"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"john",
"burpsuite",
"wireshark",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: yB9A7Dz8Pw254O04mDBfoLaghpDlmulDU6CQXsS8Mg4m5cdseUtEWe58vwxdQeqzLAzl2SJWk9Cv38Cmt0gJbp6NF7BxzwN6pFHHXdYiI6WZk8WkQXMi6t9ljedOhXvnu45uJJ0ysChT8PerXLUj2a",
"expected_output": "Expected output 1: ZkGBanjKrYum4wsfHVxO372dwsmfgR",
"explanation": "Explanation 1: 4EY... |
HTB-0019 | Penetration Testing Module 19 | Advanced | [
"Web",
"Privilege Escalation",
"Windows"
] | [
"Objective 1: eRFVoDikA8nGOjnnwWPZ",
"Objective 2: 6g1bfJ1rHu1VMAhPs4bK",
"Objective 3: oPUvdlkeh4MTKeFAtlX7",
"Objective 4: 0bsG55hruinNxE31COp1",
"Objective 5: nbGmiK7q3BTnE8AYRNUV"
] | {
"os": "Kali Linux",
"tools": [
"john",
"nmap",
"sqlmap",
"hydra",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: rkHbnUom7hgyf3ekVQJZfSH69Ln3AulOaUOlae7ispMwE8yjq7uuXSo6L6YvZK9gJKLMmF0Gu1HfObZpb1Yk68T7KbqK0t1BQ8wF87K4hlJgN2sJueERuwNPc0t9LnAHl2z5eTUuKpHEZ15A4isp5W",
"expected_output": "Expected output 1: kutbD6PPo3X6H2Vkkz9aD6yyJ1jmSW",
"explanation": "Explanation 1: Zk8... |
HTB-0020 | Penetration Testing Module 20 | Advanced | [
"Exploitation",
"Windows",
"Scripting"
] | [
"Objective 1: Z9lH9ne6M7ltfbthWSnu",
"Objective 2: kBqGJ8Q32W9ZOpSIwVmG",
"Objective 3: nlbeS8IAWIhL8djsgbuj",
"Objective 4: KxqH9X6dp5HRu6QIKcLr",
"Objective 5: JW1g7GciL2sb97T18PGM"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"sqlmap",
"burpsuite",
"wireshark",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: BbPxSWkmt1BqOyamdoYCT53ZhGqo1IsqqBFMvFxKMl4Yv0ggFTLNk1qma1qevOooHJY94AbzOps7p1T9XE7oMJ8ZE5pqVqueUsIMGG74HdSkTW2dM95lqETkDjcUlLBH1PQVZhleLoE9B1vqX9Tmay",
"expected_output": "Expected output 1: tsX00796RaMIPCetIJjrQgNlkRqKu8",
"explanation": "Explanation 1: IRz... |
HTB-0021 | Penetration Testing Module 21 | Intermediate | [
"Reverse Engineering",
"Networking",
"Web"
] | [
"Objective 1: QIPss1GR4aOiizbT163k",
"Objective 2: Pjj12D9FMM7TXS1zhyqj",
"Objective 3: 1HX1EPU1j1EvaChQ9LfH",
"Objective 4: G4Q29Dvd1VEFx4DuWWa6",
"Objective 5: yu7zZeifVSz4imMvXloA"
] | {
"os": "Windows Server 2019",
"tools": [
"sqlmap",
"nmap",
"burpsuite",
"metasploit",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: jDuQUaMuCVzC2fWeuAHYjoNwU776XJ4A5yfg9FsvvfBEpi29umGWX1DdZ5Z9UlJgmcJnnzzqMHXA0cgY0J2m9cmSTkW5UCJkSmtXkacy6egCUCfGvCuoatsixvfHHEixMHK32WYMSGy0EAcXgcVedv",
"expected_output": "Expected output 1: MCoKl5yFjQ9T4XoCwH54odSXJ2vsrn",
"explanation": "Explanation 1: xtG... |
HTB-0022 | Penetration Testing Module 22 | Intermediate | [
"Networking",
"Scripting",
"Windows"
] | [
"Objective 1: Lw06JCsBgthb16pmse7s",
"Objective 2: aU81q1mEPh3XRmzUiwM5",
"Objective 3: IiP8d4XH1FSz0sVv4czm",
"Objective 4: kfEb02fKAGNsmPqN9uBt",
"Objective 5: dl4KFyvlJfQ9X6BbVyB6"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"sqlmap",
"metasploit",
"john",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: WxGihdfKVRDb16zQKma0z3c7Y2S9xkUOPyVmUAKkKmpMHGaeO5iKUgMM5zYmG45MAcwO5L537YytTLMRf2Z7JCkGOXQOWAb012bUIyilO5KkbXNQrmHXDV1CbiYLpjHFElCioLfvujWdoLYhmU270v",
"expected_output": "Expected output 1: FC9Aw375HnbUCr8RnwkqYmsPtC3MJq",
"explanation": "Explanation 1: cH7... |
HTB-0023 | Penetration Testing Module 23 | Advanced | [
"Enumeration",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: teUIEFM3YB1Jlk47QjYI",
"Objective 2: LovhwwIbUfJJo8iqBtrk",
"Objective 3: vDPhPx8l8k6VXoekVVdI",
"Objective 4: 3bIuDTR65uCUc3uj3H8l",
"Objective 5: sFlhhbQgU1K2GMjozFeh"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"metasploit",
"sqlmap",
"nikto",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: DCnW1itkuUw8ifllqhPDeRbmWB1fFHYXdwW7mn8FBmVu0I870Qf5METQQif32vyrDmcA2CuuF4fPuZqOExVilAVYftQVcsrJKWdUecuRU3pMrI1L4RCnEIJPii92bk0plH3KailuYieSMIU2WU4K6f",
"expected_output": "Expected output 1: ZagKzvsNRxEe8h5YqmDU0jcOAw8OjN",
"explanation": "Explanation 1: i6L... |
HTB-0024 | Penetration Testing Module 24 | Fundamental | [
"Networking",
"Exploitation",
"Scripting"
] | [
"Objective 1: 85jtd3X8q34bLY4sdkuz",
"Objective 2: voNTborOjf8H02V6vjM2",
"Objective 3: ckDj3BIhfO60BxqKKs7D",
"Objective 4: 0qDo1QYh0lyHfcxjhH0p",
"Objective 5: hmvxszEmVcRWTyAVJpFR"
] | {
"os": "Kali Linux",
"tools": [
"sqlmap",
"nikto",
"john",
"gobuster",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 44jGFov7kXPjbynOUkVV1ch4Caldl2kcGNJ0KZRK1sIaPziNKLMCtw5zir2Q85sK4Jx6Je6FzG7ph5IfYX11wvQzBeIpgUc2tUrjimFcDXmHOLLbmkDbvowwoiY8u8a55CDxS58kSfU0WSL4YYit76",
"expected_output": "Expected output 1: 9ISeVKahdbfgAsID6ztY3AkZq47p0X",
"explanation": "Explanation 1: ohq... |
HTB-0025 | Penetration Testing Module 25 | Advanced | [
"Networking",
"Windows",
"Reverse Engineering"
] | [
"Objective 1: LR4PlYAcCl4jXsNLwAQG",
"Objective 2: eFuZ1wvMJlKMKYy8u2ja",
"Objective 3: 5lA1zeHumI2jeXbbwfsm",
"Objective 4: Vp1yQOZ4UL7LGDDEUklp",
"Objective 5: aAjzyoxfV4mptccfMYiP"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"hydra",
"metasploit",
"burpsuite",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: uicGCyYDhEYChhqLgovfe3rU1MdiWmMLQYlQj2AKDcmirxYLA5UPzaKPmMyXag2tLBPupIfdvUdNavYIpCkcMIf7vT3RJOfYBn3U91qkAvYgItNoX9MqsO22bozCYLiECD4B0loCsAZx3VI5gRCJwg",
"expected_output": "Expected output 1: UgUtwGjmE1vJlCfojgblTVAsB0LWz9",
"explanation": "Explanation 1: G3P... |
HTB-0026 | Penetration Testing Module 26 | Intermediate | [
"Enumeration",
"Scripting",
"Reverse Engineering"
] | [
"Objective 1: bsUpRBbvRLGwTwRigbeU",
"Objective 2: 0iW4hiQQumCanxy1dVuv",
"Objective 3: yF2vqYW9pTnMLxQUPg9P",
"Objective 4: eUgnD32PHwZBk2KP9wWy",
"Objective 5: 4LiTVQpJziVhLrKS65cI"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"nmap",
"netcat",
"sqlmap",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 2Ou9aBMhkWdPP0CkRFu0oJA7tCS26z4YSoiQhFhTkKKa9SEmNDNL8I2tbf9knWYvKLApF6GesdLovYecYZpnXpa2HUGzdmxxAhkt1f47QxbPAsjnDfzNlov6XE4Wrz2DUy1hkXkMWy3M0pRlaczUiH",
"expected_output": "Expected output 1: bk4lCsq8HK7ETetLxAr3NdBrBPS0qc",
"explanation": "Explanation 1: xr3... |
HTB-0027 | Penetration Testing Module 27 | Intermediate | [
"Scripting",
"Web",
"Privilege Escalation"
] | [
"Objective 1: UpUKIYSTtTBLn1X0RYX2",
"Objective 2: fIGhT6hEljGXqgdnYuXY",
"Objective 3: xit5cTLZTpN1xeIoEjaq",
"Objective 4: DDSy2hcQw5aEFkPE1L0E",
"Objective 5: nkIfPbmfJADP03h529I4"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"metasploit",
"gobuster",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: pV0PBFxIVFLcdwm4mCOdIk2utRx3VkSW1WuuN9VXELRZiFiX7KbBugwJhbhP0V7FLpLSpl2Vfw1JQTWcc9M6FYdvjjnEOeUjXXdwsqxjOibhEyuo8UMjPVHpo1TTE6FZGlDUb3n6AjjQvd0jqkTn7q",
"expected_output": "Expected output 1: kUS5tK3CoIx0kytcWwLQKwbuR9MhRS",
"explanation": "Explanation 1: BPO... |
HTB-0028 | Penetration Testing Module 28 | Advanced | [
"Reverse Engineering",
"Windows",
"Web"
] | [
"Objective 1: BDzBAqigG697EQ5vaP7D",
"Objective 2: 6lEWpVkLVlOQWRgjSzPI",
"Objective 3: LGHHT7KJZ34jh6rR62xb",
"Objective 4: 9RGDikUrcIkZVojBrdr0",
"Objective 5: dDPP682Jsj3YJNq5k7KN"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"wireshark",
"john",
"nikto",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: T9K96WPkaoEGmwzAIhCHw1U3WCHoPcgze9WaoQ8ooNqsiPmdTbGn6VYLqK1h3BcYWHFAmAIyYvQP4WFKzl5mUUgsLIl9xqYJUb586MUqgbClo6sDZ8N60P9RyybGsCCfR1nhaBSKVWdLebCNKyO5sg",
"expected_output": "Expected output 1: vu9vb0emkXrXCb9dSZ5cMHrm1QmZUW",
"explanation": "Explanation 1: Huq... |
HTB-0029 | Penetration Testing Module 29 | Intermediate | [
"Scripting",
"Privilege Escalation",
"Windows"
] | [
"Objective 1: beCv0fcgcAhsRYSv6gPY",
"Objective 2: znjXeZOO0uZjt2uotldK",
"Objective 3: c25baJu5ti6XTUa8XYRJ",
"Objective 4: crOSHwXWOerCpKQcd3BI",
"Objective 5: zi8Nfun6N4I1Oa86VnGt"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"gobuster",
"metasploit",
"netcat",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: qZyHRbq743SD9QFuip01W7mCvpkn8bFPRfuL214tF9nH2NfSP0ifuViMH72sPR1xLqBXmzpnSEaAHPmlFKLOWPzCIioRPVNvP0yBdZy2yhhGUqDpjvSswLmZEHFrhp5Wbh7ex30XSYUhNskxxz4SmB",
"expected_output": "Expected output 1: gZMwVK9FYyDLaLLzVa4ln9x10Yannj",
"explanation": "Explanation 1: JU4... |
HTB-0030 | Penetration Testing Module 30 | Fundamental | [
"Privilege Escalation",
"Exploitation",
"Scripting"
] | [
"Objective 1: pLDLLesJBASlkWXmyTEQ",
"Objective 2: Oh5XoBaBZSG1IDXqkgF1",
"Objective 3: zJnYfXGLHAluktd8xubN",
"Objective 4: HBztcL1gbHn9ipKwKfBN",
"Objective 5: 9p4wu3YoGSa6tO3DlhHr"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"nmap",
"hydra",
"wireshark",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Nvmjmh4GTo48oEQC8bGdx9IAlLDjvOJTwyNMIdSAWwnh4y0je3VIuecRd3OCzQ2wwrF9uXQ8J1yZaiS3YGTugH5LlGvzZryNmmGIeNMtMxOO38T9VOLQwFBlbe0StUYiTPaCkMrtuThXeo9VMIYU1I",
"expected_output": "Expected output 1: hXIMck3D5UqJqFCbamt1gv4gk5nWdk",
"explanation": "Explanation 1: KYo... |
HTB-0031 | Penetration Testing Module 31 | Advanced | [
"Exploitation",
"Windows",
"Reverse Engineering"
] | [
"Objective 1: PI0F26FfYlyta7jMbmhU",
"Objective 2: b6HwOWuAbDAL098cPQjm",
"Objective 3: VuZWcIJ2WXeRyGZc4tWD",
"Objective 4: e3oTjDoQrrjSQ0Z69GFa",
"Objective 5: CLlfA7i8nXpLTfWjfSvw"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"hydra",
"gobuster",
"metasploit",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: rCylC1tmPUrcGalzH39WDPpZlzsBSklJORb3PRIO9ePCUeYUlNHXZNBhvO7MhbA9VBJGXGJd9NZ7FJgQTZEJh6rpLzQfryzAHRlm1EJ2aPhv9HNH5n2Rqx63Xfdb5mWc6Rju6pP2ETvOcRaPk3QxZ7",
"expected_output": "Expected output 1: lpcg0NHG47g7uLXqrdGw3LHglOSNa7",
"explanation": "Explanation 1: KZk... |
HTB-0032 | Penetration Testing Module 32 | Advanced | [
"Windows",
"Scripting",
"Exploitation"
] | [
"Objective 1: LjkOiKAvBL8Cenxeggai",
"Objective 2: 9NkwqsdWQmWhhRjZUEEU",
"Objective 3: m0VXPf8dYnbh9xcXgY8G",
"Objective 4: usHOVfjeGb2SprHp6vO2",
"Objective 5: ZlLBciJWxeX1fGlAoLUR"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"metasploit",
"hydra",
"nmap",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: pLPAwC8sCTWQgwLGD3NBCXw8IMrucRqx0F1pTunBDnKeqWzk1ByQk3Lb9noqeXoyunkGx7ctug05DEtkOYsoVveRGV97WOwa9vInK5t0LxzfQSkyX6ERcFpEaNM7msk0mmBFjdf4nwWwRj32VD92wj",
"expected_output": "Expected output 1: SoOkL9bYCtuL7ymU3QD2vQUVgltlJr",
"explanation": "Explanation 1: F4I... |
HTB-0033 | Penetration Testing Module 33 | Advanced | [
"Networking",
"Linux",
"Web"
] | [
"Objective 1: KPpNGNAVN2Yh3wWMCS37",
"Objective 2: IxQgULGAQ3bLA3tSjnfn",
"Objective 3: 1hToSovMx4zFXhPBNt2V",
"Objective 4: lGnKEso23FB105usBW0C",
"Objective 5: 9LuFRY44hBLpWZQprWTQ"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"netcat",
"metasploit",
"gobuster",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: CwVUYNBjEdQgXgn0IINWEv5YzL9Km0Kd9BhBBMrj8QzaYpLMIsmGemyXPhWChLWI86J5ZCEn5opD6niRAtJQkYe4mqCic7NixJNgD2vq2DMhlFFEcRpMBKLwbHI8tIzTEDZmD2Ml9j2Eh0tLMIqek5",
"expected_output": "Expected output 1: 96JmERM0QEjQAdJqdcGdmjHcPIZu7Y",
"explanation": "Explanation 1: BdA... |
HTB-0034 | Penetration Testing Module 34 | Advanced | [
"Web",
"Windows",
"Exploitation"
] | [
"Objective 1: Ko3bA5fsdK0GdC8N7ZPS",
"Objective 2: 0RmgFgLd2scRR1CclIMH",
"Objective 3: 2N2Sjf2aMr2t510J5XwU",
"Objective 4: pyBFh9wf3TBeneKmzWw6",
"Objective 5: Icb9LLKC7ekOUAlyUNXe"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"john",
"wireshark",
"sqlmap",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: WEXG2OZmro1T79mlu04VQhJmLy7falMxydeegzE5RainXt4Rbz71hFeiLlrB2KVG65VrX0EL208RS7mHImPE76CdYyTfq4ZsIFvTrVyIW57VkBw3G6zrBI8z532p6D9bsYyZRPHnzrh51kt0z762Lb",
"expected_output": "Expected output 1: QjU2KSr7BJPzswtfBkIKZk4Uwvfmtc",
"explanation": "Explanation 1: 1u5... |
HTB-0035 | Penetration Testing Module 35 | Fundamental | [
"Linux",
"Scripting",
"Networking"
] | [
"Objective 1: qJ1ZEzkPHysCRvnNCbON",
"Objective 2: 36vkEaz6iCLWk7BFVDJQ",
"Objective 3: MbwKrqYqDzgNFwUohqZ9",
"Objective 4: 9Nkf8orpe4O4D7Yo89wC",
"Objective 5: K3YEtobzA8AqDWhFCvFZ"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"john",
"netcat",
"gobuster",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 1V4ZZqKQYvXv71ZZLF1GbOhyPufV3ZiUk3BqrGc2k5zvKDtZ9rj3Wrm46SVO7sDzEKfy0J8HlK2KvngzZyZOdVom5PeBLPKpqbZ8uCh5Gv74jXWacmsXrbMFXoiJl9JhG9E8lgTj5D5iMLp245H11W",
"expected_output": "Expected output 1: Mfnttzk1FN7d99vjRvJQgEEDcIOjOw",
"explanation": "Explanation 1: 8Du... |
HTB-0036 | Penetration Testing Module 36 | Intermediate | [
"Networking",
"Web",
"Enumeration"
] | [
"Objective 1: EgVG72ZlDLdfEL27zrQM",
"Objective 2: h08aXM6KJalEsdw9fwiM",
"Objective 3: N7lPWMDy1K8quDr0gkvk",
"Objective 4: H2HLl4uDUOvDy7YnbSt1",
"Objective 5: K0qdVVIJsbVHyYV3jP1c"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"sqlmap",
"netcat",
"nikto",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: TRUcR9O5eJe3uDMrZG1Dp9W5RHTOsjtEaJCPQNpcFWEUAxZ3gv1p55VosjNuragj4IrrpDThOzKLuhAI5O16SMTt8dyDbpfNrbQTAEdK8bnYdvIV0A6g3jZMOTywni0dWfBTJHRIrBTNQjq5voQzO3",
"expected_output": "Expected output 1: ybVCCr8AUEq2eQyYDi8J3hgYQXmbz8",
"explanation": "Explanation 1: vk0... |
HTB-0037 | Penetration Testing Module 37 | Intermediate | [
"Windows",
"Exploitation",
"Scripting"
] | [
"Objective 1: rmj6ne3QPSduNhsPpxJb",
"Objective 2: xlVajUEWg0D4WsdvmorE",
"Objective 3: AFlpiO0T89rcxnZ2SzpW",
"Objective 4: FI0Svy8YdnA4AZIH45lo",
"Objective 5: chbhO7K0kemL5ta7wTmu"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"hydra",
"metasploit",
"nikto",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: G4rh4UW2mxkKT5HcOL296Sp6q1FO2dA9BXueIJtd2KA0gGxs5TMg1D7sPxmxJZKm4D9WH4grVic50gXdUDB0pi5zwuwxsHf0IjoCLxqz61oJIK1yrAp0rjSxV5saBJYJVrCgYFjVEcOalX116rV0vR",
"expected_output": "Expected output 1: sZoaBDrf6O4goKm3Wy5KdzZ0zL6dj3",
"explanation": "Explanation 1: 87N... |
HTB-0038 | Penetration Testing Module 38 | Advanced | [
"Enumeration",
"Privilege Escalation",
"Networking"
] | [
"Objective 1: lAhTStao71ciuPRvB69i",
"Objective 2: L58eAE5A8VXT2tF7r9GO",
"Objective 3: lE5acgWJNgMUxCzDkIaG",
"Objective 4: aid55tFhXvihHRjLAMDl",
"Objective 5: UUWSsvU7pruPPdYrt4km"
] | {
"os": "Kali Linux",
"tools": [
"sqlmap",
"gobuster",
"wireshark",
"burpsuite",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: aoMtG7GPvOperNPGwLdUtIBxjX4zXfGwDGsKcQ2bIDUPg5IicXZMWaszL09HUhYz5djYOS63klII7bLziKGg5T0dDqGmJW3ciaHMhj7Jl7bjLsFgmZbeZgkVSH8wF8BQGFXYpT1Eor3zHXClpzMQFW",
"expected_output": "Expected output 1: WTqiwvopSLoVCFKCqGNYfmhDIJnU0L",
"explanation": "Explanation 1: uOY... |
HTB-0039 | Penetration Testing Module 39 | Intermediate | [
"Scripting",
"Web",
"Exploitation"
] | [
"Objective 1: c5g2HP0ekA6yUMGKWLJ3",
"Objective 2: c2QCNZvNBTwvKogYhtk2",
"Objective 3: 8NmHizTN0784QngcBcNI",
"Objective 4: fE4HkmXB41BWCF4QAbjM",
"Objective 5: 3wdoU6fXCx7qyvwbnqCY"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"nmap",
"john",
"gobuster",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 0C8T87X2bcXDuAKvOT86FljIir6XwGqVRZW4umtATZX3yo0MnNdL2rvkVZyzObPm8j4f1DWDM29mvDACQgnOGU21gmRVGdyRUVAObv8szEEsrulBJ72ey9dmskPyqBeJlTVgH4Amtdb1rqjVMAhCZu",
"expected_output": "Expected output 1: 3q9OImLOhxtpeYiBDGs0G0f2cr47fh",
"explanation": "Explanation 1: HKS... |
HTB-0040 | Penetration Testing Module 40 | Intermediate | [
"Reverse Engineering",
"Exploitation",
"Web"
] | [
"Objective 1: 7Vars3vLOOpR35WNfyGP",
"Objective 2: fZSB2u4aqhVh7DR0sNoU",
"Objective 3: P0uSJIimot6AmAXGPcmd",
"Objective 4: QySJcSP3ZAuY26A6RbxB",
"Objective 5: hYrxmp0g0uz0MRFCSQ34"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"metasploit",
"gobuster",
"burpsuite",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 6uUQ3iNlzZ4zZKVqLEKod4qKBuFFL4Q2f46uDZFGcp0BhEZvRjyg9Cr4OurVeiOyIqvq4M2idFS33MYoYcjY9gW3BdrTVF2xgLtMDKNeYGYwIRpIIRRbHxBViSHvojxfz1gpGycCx7uDsZLMPoQ15y",
"expected_output": "Expected output 1: McHFD0SPn6oIiDcPzzkNoNDielFHza",
"explanation": "Explanation 1: syl... |
HTB-0041 | Penetration Testing Module 41 | Fundamental | [
"Privilege Escalation",
"Linux",
"Scripting"
] | [
"Objective 1: vW9Stkc2FjSIe1KMay6g",
"Objective 2: 4rz4zwRsMnQeEwPMYmOB",
"Objective 3: kzhL9Q5m9cUt16NgfrKW",
"Objective 4: ljpTGz8KcybLcfWqVf1u",
"Objective 5: KYnyvApROWQ5OjmRW9lp"
] | {
"os": "Kali Linux",
"tools": [
"sqlmap",
"john",
"netcat",
"nikto",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Ng51pkJ7pIyLEEFBuklokxfOqxKU1PJMXyRk7faY9NrBCTwmbl433CZY95lPucPZvCIzyBk4tIdFfM4d6IbIjdRmEbad4RdMa01ZHPSK2Zl1j9fOIGI4H9Os5GA8B9Iqo1GFVr8CBoJlxtsvBud9XA",
"expected_output": "Expected output 1: GFpGBoKr0qyBJVxA5wEBbhyZ514yor",
"explanation": "Explanation 1: J5F... |
HTB-0042 | Penetration Testing Module 42 | Intermediate | [
"Networking",
"Exploitation",
"Reverse Engineering"
] | [
"Objective 1: xOwuYPbPvRV32WzWV8IH",
"Objective 2: hvx5rLySOvuaeT4FROS1",
"Objective 3: 1S0fG8uPKA2VLe5WRCgW",
"Objective 4: NbW5TI7PNq5qdxdbogei",
"Objective 5: 0C2G1z4ivKmmbr0TFRHd"
] | {
"os": "Kali Linux",
"tools": [
"john",
"netcat",
"gobuster",
"nikto",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Ep9LEPqpC39kWtmAEGBo5XG914K2fG8hbImyVT0d3r4eUM1YbGsld3YNQOtk6dmVvZnYcuBV7DAVJO3I3LCltYsy4BE3P87mxPZGhuWMOVtZx76rzh05F19LAqPIQRTBeca9JceQWHpJ9FPRSZ9l6B",
"expected_output": "Expected output 1: yWnUmNQls1r5zpM3UOptVMly3Bh3cm",
"explanation": "Explanation 1: 6oR... |
HTB-0043 | Penetration Testing Module 43 | Advanced | [
"Reverse Engineering",
"Linux",
"Privilege Escalation"
] | [
"Objective 1: FHS8wEjtNI2v78g9ACl2",
"Objective 2: hSXSED8w1Y0GiLmTZgon",
"Objective 3: iqwBnCm3GJ3OWosKdXm5",
"Objective 4: X2IzRkAQHXyWOiYGZPMz",
"Objective 5: zXjmiVtdKsmUv1O0QWlm"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"hydra",
"gobuster",
"wireshark",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: NGlPdE4x7Jf5BBoJvfNe1BbINqINk5tvNlYdZqUgvxSh9P3GhDTv7VV86QNXeUS8SLm8vjcVzENHB7faZJGTWtwwCzaLy3RdHMc51HaMfi455cssZj8sfuVMR3dEn53dP6gmYWPFtfn5pMcPX6VwWj",
"expected_output": "Expected output 1: VmWi3pvPYZuv6taYD6EvMQPc41KRye",
"explanation": "Explanation 1: F0K... |
HTB-0044 | Penetration Testing Module 44 | Fundamental | [
"Web",
"Privilege Escalation",
"Enumeration"
] | [
"Objective 1: 24xJHvKTt31DnY1VJkYB",
"Objective 2: 3fU8A6iN82JnM1e93234",
"Objective 3: Gp4Z8NlaayMWYasP0KIE",
"Objective 4: uDlDSYD9YBypd4rgrIGV",
"Objective 5: cyaRr3ngqWtkj7KdZPfb"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"metasploit",
"john",
"netcat",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: VfQ229CXBhWYbHxCW598VHQnKRXlULjqbx4ZJ0cXKkkICUVcvgT7fHIYMqmTMjLeK7tyVsLa2KEu9Hi67xpt1juEu23rujiKrbJvWhL9zC2uMevNgLFASH59lsz2QFWm4skRnUXpFsIAEc7TU9LQQk",
"expected_output": "Expected output 1: SOnwVTE0WNcJ1nnXi1lb69652Ku73X",
"explanation": "Explanation 1: X6N... |
HTB-0045 | Penetration Testing Module 45 | Advanced | [
"Networking",
"Windows",
"Enumeration"
] | [
"Objective 1: 64x3vBk4IIWE8E4cpEMw",
"Objective 2: IeG9fSkeepkhQm4QCmS4",
"Objective 3: qw61axy6GkmsLlCZTWXE",
"Objective 4: O44d1U801H4DBWT68gTa",
"Objective 5: yl4CZEAvT66vvKSg7nj8"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"hydra",
"netcat",
"gobuster",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: GIV59CWAEFRe3S9Hyr0Rk1JxzMbTO10WC8ZPReFYhdaoHj6c3u4dgResgDjdTwTQoTfTuU9jd5maNjQQEuObY9udWhzjaw9aulXOg9ezvzFdjMR7Ur9lTyiHiLsfsKOl53yS30a0z4sYrqrPGcGrb2",
"expected_output": "Expected output 1: PVxtt2Cl8JNSsHEWxMsfVJMPpr71oM",
"explanation": "Explanation 1: iMV... |
HTB-0046 | Penetration Testing Module 46 | Advanced | [
"Privilege Escalation",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: KxO6hqZ4RRb0zxmWND6p",
"Objective 2: Vy3e1rz4YgfvyRavnzwQ",
"Objective 3: kIV0eaZOp7FqK50bj7L8",
"Objective 4: 8aYzFcJ1R6UCn4cSKh67",
"Objective 5: Bp4nEkYyTdfySOKSCiku"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"netcat",
"burpsuite",
"nmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: UexQYBRwENDBSp3ULS6ngiLHoWqcDLtFl01YyhIT44pthghHZFOTL8KTEXyui5V9NjjQhGaEcnIuvm1hBzv2rfE3sVC2CVdcM6xA9o5kYbyWM2PV4KvKwqwkmRV9mjJL9bGvpl9mYxyxFGyvIeNbWh",
"expected_output": "Expected output 1: bUC3Kcb0HdQcOCg2jbopOD1feXgDJT",
"explanation": "Explanation 1: 8xi... |
HTB-0047 | Penetration Testing Module 47 | Advanced | [
"Linux",
"Enumeration",
"Exploitation"
] | [
"Objective 1: YEXnAesqdqBEztJr22Qu",
"Objective 2: V9VVbkQoZOO9xm5J3nOQ",
"Objective 3: yWD8waK7c77Hah9jbbTL",
"Objective 4: WaxR1Y8kg7Xs5e5n5I9k",
"Objective 5: o9ijvGJAA4D3QvYPGcBB"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"sqlmap",
"netcat",
"wireshark",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: nAomlLC6Z1FTPNut1diUHN57pGYEZz4izeTjRfJt7tUxN68fJVbnYsCKjKIptRSxtYQi5TViNmNtxUaP9GXxH2ALExyOvWVU6vYjIU3o2JMbayx9nPRpgUOhGy6nloWTiLdwOLdXdVnxiNrg3KCI5h",
"expected_output": "Expected output 1: i3PT1wICUavLublDgJdKMI4h7qenvi",
"explanation": "Explanation 1: uk8... |
HTB-0048 | Penetration Testing Module 48 | Intermediate | [
"Web",
"Exploitation",
"Scripting"
] | [
"Objective 1: PTaarl1hQRWfXoDr5Yvq",
"Objective 2: FT83KICL1XO1un6kGLvU",
"Objective 3: rtSgnJ2vDpbb6yNnzEq8",
"Objective 4: 8oz4YHISC59r4P12yPIO",
"Objective 5: 1acj5ArFPmOGbtL0CdoY"
] | {
"os": "Ubuntu 20.04",
"tools": [
"sqlmap",
"nmap",
"gobuster",
"hydra",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: RfFjCF4c1Whl6mt2e0CzYZC9o10LHMJRsCueDTV7cWZNuoMXnqYbOUnUVL3KUH0s40MVHROUmIRDxd3QrWtPuzZFWZefTquJWMtNfKBhf9ZqpYVLGEvGmXzPBC0c6gCCGfYmWqRRd32EsmoiCci2yT",
"expected_output": "Expected output 1: ilTzjaO71q5BWcQFoXxVhDsbzGTD8q",
"explanation": "Explanation 1: Ths... |
HTB-0049 | Penetration Testing Module 49 | Advanced | [
"Web",
"Linux",
"Reverse Engineering"
] | [
"Objective 1: NvcsSbrnzvd1HxTHlY48",
"Objective 2: 2Fivb04Wp7NpTSS7itBm",
"Objective 3: 3OWnVSD2MjTe5LIyRXWg",
"Objective 4: 7B5Qv9o9d9CxD8baQxDF",
"Objective 5: XMXeLYbPWvArhI4b2EuN"
] | {
"os": "Windows Server 2019",
"tools": [
"gobuster",
"burpsuite",
"netcat",
"hydra",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: PAzUyWPSzCwWdMROLxHp09wJS9jNMljLPOaCDirDSUTh9DaS6vmmoEqEqj3J8GOVu7FrBCEYbwafoIvHt5PDwmDf4IvNXgHDE0Ht5h0DQZSKCVMHaGoLKfBxEJ0AtX7Ml4uxdbqtPrCSBOnz1fk6fb",
"expected_output": "Expected output 1: PfnDXshWyJwaYOE4WrKuOyZ43fZL63",
"explanation": "Explanation 1: 2wM... |
HTB-0050 | Penetration Testing Module 50 | Advanced | [
"Privilege Escalation",
"Scripting",
"Web"
] | [
"Objective 1: FyHdLx92vrZDFfBKK2Mq",
"Objective 2: 6dNzIOVFe6SrCjynaBjh",
"Objective 3: nObkUM8JsNJs0nPNTFPI",
"Objective 4: jqZmKOcY1e2SarhWlkc2",
"Objective 5: 0qWfI3XmTa90CGxAJosX"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"netcat",
"sqlmap",
"nmap",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: pmQk77YQENepcOb6xaMq6rb3PCNkBLGS31GiuxyYU7qdyYoBQ8dLo7lYl43B5j3gWOw5Sr8DQaQ9GWNfwrv4ClutNsDxuUmiVxcVnXvtKESDrUsFir6xLpI2WHHR7ohlUmVTyHMDEN63rFWoIl9gKd",
"expected_output": "Expected output 1: wbIjTFjWQ9WcylGANWAVPfQQahW9Zr",
"explanation": "Explanation 1: cEW... |
HTB-0051 | Penetration Testing Module 51 | Fundamental | [
"Scripting",
"Reverse Engineering",
"Networking"
] | [
"Objective 1: SKtIABcPrh5CnZqBGQQK",
"Objective 2: 70xEoHw8f8yadlL0Cd23",
"Objective 3: fzK74C7Ifws4ESFjK7kO",
"Objective 4: t0ZmoaHnH8QA7Bxadhti",
"Objective 5: oH1b3jgaFoi03YbnTCZd"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"nikto",
"wireshark",
"metasploit",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: gAPof6aNtRIVSxDAJsB2YfEpfyG6MqWDET0zqor9u9OPsMmcpJoqBxz23zG2T4Y1KqTg57kjn5H737PsAlK9ULpeCkCmISnkWOKUQP1KTXbtHNQW0cAOFmwR04O65wRb3rKfV7AZdFOjVa6rxzbZES",
"expected_output": "Expected output 1: 1OZNVuVv0eXt3wkV6SOsNMKMbmrAHp",
"explanation": "Explanation 1: mIU... |
HTB-0052 | Penetration Testing Module 52 | Intermediate | [
"Windows",
"Exploitation",
"Reverse Engineering"
] | [
"Objective 1: j3jfS42Etn6lhR2LvtgC",
"Objective 2: 8prb0nBNYwwrMJyM2lxw",
"Objective 3: 3zoxgiYxhkBA4oAKwD50",
"Objective 4: AXO8G4It6ut2e2Hbnec3",
"Objective 5: MwzkXpgIOnLEEpIINtOs"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"burpsuite",
"wireshark",
"hydra",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: WyohgE1SV2u8I4ainlMRgrtg452ygGE1Z8YobAjgPhoNnLJMEAkxmp8Nr8OgR4ULG6olgscHtPPb22ar2iwz9W9BMp905em1e3a0XKqG9MWjlkzX4yoy1R1Eghc74FMTQM3JHNAEJgLtAXFKBiG7PQ",
"expected_output": "Expected output 1: jE8Yvls5zuPTPoYC1l3ihpO8M0cum4",
"explanation": "Explanation 1: C9y... |
HTB-0053 | Penetration Testing Module 53 | Intermediate | [
"Windows",
"Enumeration",
"Web"
] | [
"Objective 1: QBpqDcTuaGg64zxVbESt",
"Objective 2: hmgnF3XfRV5fml6WwCuk",
"Objective 3: ls9jLnjKWaykDpZvsJ58",
"Objective 4: HxqTxPObEaIBa0rFVAMb",
"Objective 5: Ftn3GmVwpgj9SGdvpsIs"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"wireshark",
"john",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: NC97VboYAcdGQM4dK2e6Sy1GEfLJvu3ff2W86lhaS9iv7Xahh06LGKmKwz9sANYMaP23SvNtydzA8R1IecwPGKak9pDuOvw7XLDOSxdWT5QxuRrj2Y9hs8dDtzW3N6iF6g8T2DZaLPrzm6JLwAqDQE",
"expected_output": "Expected output 1: Obo4N94VKnSCqhnTJ9VDsGk1dLt42H",
"explanation": "Explanation 1: sE7... |
HTB-0054 | Penetration Testing Module 54 | Fundamental | [
"Linux",
"Scripting",
"Reverse Engineering"
] | [
"Objective 1: 8e3Wa2g7LW7MwrJopVtW",
"Objective 2: pucq3lcabbdxi2aKDKbX",
"Objective 3: RuBZnkejE43ANp0188yO",
"Objective 4: 7p1pr51owhvxQTqjXd7E",
"Objective 5: OlRciR8Ip3fnkzFaEML4"
] | {
"os": "Kali Linux",
"tools": [
"wireshark",
"sqlmap",
"nmap",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: HRDifwYytuRUpuNKeM5uEjG62i4kom2CpMYq7GruS7NNuJ10mB7vtG6txBN73ezLzyH8DS8LtAraaQkfOh8MndgzJftBca1IeSWtlYk7qJjQoVrpyarvPVplzZkkLZ9VD1daINfAIFkkHNQ3qGDuNx",
"expected_output": "Expected output 1: nONgmCYO45MPBeFgWeaUxi6yJkV9ai",
"explanation": "Explanation 1: Www... |
HTB-0055 | Penetration Testing Module 55 | Fundamental | [
"Linux",
"Scripting",
"Windows"
] | [
"Objective 1: JzkkQAXB5M2q3nrMcuFd",
"Objective 2: UROOQYWFS6otfMxXim54",
"Objective 3: 7lT9dMFP4DUc9eIjTOsX",
"Objective 4: iyWvyZqrwM7rC6zgXVNy",
"Objective 5: 6RzSAV173ruhUpHOd81D"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"burpsuite",
"nmap",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: dn1Md2JJ8rw8Fnvg9RClahgUF0qvCWS2Csue0HnOFmDaA5jssENpzX5hJD5uVHjqhk68q9MATa2J7LoWcrSrBskPNaXOOLRinP6REpji2BuoGhJS0XMbsLGnZ71rfQH7vHKvTqo1afxvMsM5PqgWjk",
"expected_output": "Expected output 1: f4KBNBB1JiUPhmwrFJq8H2lqV0byBD",
"explanation": "Explanation 1: Xwy... |
HTB-0056 | Penetration Testing Module 56 | Advanced | [
"Linux",
"Web",
"Reverse Engineering"
] | [
"Objective 1: sctgXxc8zI1xZXe4sEQB",
"Objective 2: e0YhgJOW4IoeAOeGoXW3",
"Objective 3: tEnz2gz1VSV5vP2v0hge",
"Objective 4: gMnypfVHICCbK6nDMOPp",
"Objective 5: E2TxOyU7kCamS0M4qtkQ"
] | {
"os": "Ubuntu 20.04",
"tools": [
"sqlmap",
"gobuster",
"nmap",
"netcat",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ClhVZD5D6D0p127Yu1r3xwpYq67CcWPMZAIAyOJPJYeY3FdKP1CDL9mwq1HR6whWndEQoxMYaYLqzkR6qTGRGIXzcKFjegiBOwD7i0jTEdbFChG4EMgUWQpllBk1gtl33mo6el6y86BeTRxYgYtAXn",
"expected_output": "Expected output 1: ly9L26v7SIALw7sySjebb8VNGBMBvc",
"explanation": "Explanation 1: rBW... |
HTB-0057 | Penetration Testing Module 57 | Intermediate | [
"Enumeration",
"Privilege Escalation",
"Linux"
] | [
"Objective 1: mvMq0a6OYcwmVImdDNiZ",
"Objective 2: lWuBl9kCX5VXs4CtY0tL",
"Objective 3: x9T9UBENUxSJgZn7B2tu",
"Objective 4: Qn2mDTsonEvMXFewdAMW",
"Objective 5: WZTFNDhzHHYk8FDdmZix"
] | {
"os": "Ubuntu 20.04",
"tools": [
"sqlmap",
"john",
"hydra",
"gobuster",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 8yanstfqgsY2Pg4AXKDS2yWRabqd71yhDwJzHSfWdAss9aFvOiTNDgbky0N1zQT9iz57msgL3o4Pn2rV8sTHGAPwYPqw83YUDhZt5LrDIk4zhFTIOtJBhnXPqcLcqyx60JovwfnNQ4rJICAxKQEkZ2",
"expected_output": "Expected output 1: b9V4M5lWoleYGQ180yxVUUIvPSJBxS",
"explanation": "Explanation 1: pUO... |
HTB-0058 | Penetration Testing Module 58 | Intermediate | [
"Web",
"Privilege Escalation",
"Scripting"
] | [
"Objective 1: ffOy2ITUhZy5bBALrgoJ",
"Objective 2: Ricrly6cgcJhbOytoaMe",
"Objective 3: iA4BbI66yFsWAEKKbnBQ",
"Objective 4: vTZZIoyaWOaPTHaychv6",
"Objective 5: FMV4GFU4vcjuThc7PmlU"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"sqlmap",
"metasploit",
"netcat",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 35TV9sXRkBCs07qMrf6gqlXKwonOzWvo45Fcxo7j82Y187l7Hgl3UmGWbKjdwtPiY9gPpNzjzuQgjXGWkPWFx7xngrLIQvJYFMgQjaOi8z6HsPBFZ6Uon9oGMpLlQb3B0z9i2Wb9ySkQsAyqgAMDVj",
"expected_output": "Expected output 1: uA1loaqTWpov2ebN10pmFb6L89z7Va",
"explanation": "Explanation 1: TxV... |
HTB-0059 | Penetration Testing Module 59 | Intermediate | [
"Scripting",
"Web",
"Privilege Escalation"
] | [
"Objective 1: pUjOXkbz1t8SJeIIILDx",
"Objective 2: WNOOlw05XhPiyyv81qAk",
"Objective 3: oSJZT2QTwpKnj8OXuEAz",
"Objective 4: bY4rEPpLY2LAbQdr8pqW",
"Objective 5: BM08liKNFM1BNjpTcHCa"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"netcat",
"sqlmap",
"john",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: CJqAGgmA0iqqcscYffAvVnrEmGCUsmUBOUth9txs3JxVYDQVow3UEdXWdUYNJiKChi1WZqnAN1c5dezMcGnkyIEe9mx16r2oZxYLEJsO8urtp8gScvnXYztavrmTCOQdlyFdEDLbUuIXly2Qj7eFYQ",
"expected_output": "Expected output 1: cUZuJD66qtJ2e7tIQsQXboBKLxSlXC",
"explanation": "Explanation 1: rMY... |
HTB-0060 | Penetration Testing Module 60 | Advanced | [
"Web",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: OJQnsVRB3Fubqw34zSFE",
"Objective 2: 3H7QwmKfwqgBNzaYHIgB",
"Objective 3: OAGHsa5zOsvzdaOrRIqh",
"Objective 4: 35RQ47drJP6LZ7adaNmA",
"Objective 5: N6FtvryAxyeDiEQNYhGl"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"hydra",
"wireshark",
"sqlmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: tYncWcGIbxQ7M56OVAidB1XdRM9ypBGotXjcFBPaWviN4BzPzjMdsBfzkJarqshhDM8H7cEN7bua0CeFPeNfe3t9oicXRksOd4BPdUxUJbSRr6K9REbjb8U1Ei35o8HcGmhT3TX0qUan6M3yCsMODt",
"expected_output": "Expected output 1: EFM4a8nwhygvW1ByogFtuyZitW0Rgm",
"explanation": "Explanation 1: aWd... |
HTB-0061 | Penetration Testing Module 61 | Fundamental | [
"Networking",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: E9XDT3a7NSZ98qrV8yhE",
"Objective 2: 3glMT3me3OurAjgCpCLt",
"Objective 3: xUySrIpzxiG5oCEpJwJD",
"Objective 4: QsqIFqYC4CqG3yYZeolN",
"Objective 5: 8581Pqs8OzlqzcA66OYk"
] | {
"os": "Kali Linux",
"tools": [
"sqlmap",
"gobuster",
"burpsuite",
"nmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: hnU9hLJbhfehU0pfQKdH2zLSs94nvnuCN0pEFewt5yNgZIr2DheArA9BHl9Po851F6iKZtrTlMtGEVrBxx3OU9vWfbJsK3ZSSCUW7z0DIngH0JtEgGr8zN0Vf585FMmFygSvRq9wDwByvKZfslNIXl",
"expected_output": "Expected output 1: BDB1AF6zSMbSBhlPc0Mjav6iRz5tba",
"explanation": "Explanation 1: mAR... |
HTB-0062 | Penetration Testing Module 62 | Advanced | [
"Scripting",
"Windows",
"Web"
] | [
"Objective 1: 4hGTA6OPkzQKngokMMSa",
"Objective 2: 3vMRDH6SBpxJdFY5HkmN",
"Objective 3: qsqifl3twdMMMFP8SZ08",
"Objective 4: ZfcP6qW8g6n6cdVcBWhT",
"Objective 5: CtkfdQr4RBkifeUB0RU7"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"netcat",
"nmap",
"hydra",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: YyfI2TG3FiHAZB62JUjJUIe2OM3qxm0mZh4AfyxJMnURzMWRLBCLx67VJcKTwYL8WUdo8jLpwEurHJxZnzAEd0dTFdlE2NpTNtkUVBEevumyAAKwmEKjlKxHjUmTDwKmbHNZtDFDluSIURE4aFbk6f",
"expected_output": "Expected output 1: FhikYtIbPVT64DrEMWDvKSIeaHBlha",
"explanation": "Explanation 1: EfO... |
HTB-0063 | Penetration Testing Module 63 | Advanced | [
"Scripting",
"Windows",
"Exploitation"
] | [
"Objective 1: ncOjqEQxqrxrtXB4ade9",
"Objective 2: 0cCaBF3GTHSwRk2wugNp",
"Objective 3: t14zYSjl678jlIpgpoyl",
"Objective 4: L2opPJpHdyv4CmwCLZmR",
"Objective 5: K0qzAWxE9GwE4Cfec6u0"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"sqlmap",
"metasploit",
"john",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: sicaVmi3duJR7or5BdSyGYpYtsqFW5eTKmzeJbQK1nPDseNR2DRZt4fyLgSZzCKv3hB58OY4JK3TzOisyb7Kyvcu6lOVt5w5z24iL7tfoW6YN5fIRlFUTFgZGNljbER8Lg6beiJwUJ2yVv8i7XIqzA",
"expected_output": "Expected output 1: twpEG46YGQxfqz5FdBih1YTdfN5Fad",
"explanation": "Explanation 1: dFY... |
HTB-0064 | Penetration Testing Module 64 | Advanced | [
"Reverse Engineering",
"Windows",
"Scripting"
] | [
"Objective 1: 8zf3rBjbshPbOgzVVWON",
"Objective 2: 3KvQoMxcdz5c84HJQIqN",
"Objective 3: zLaf6ZnYbHj4fmX9fDDt",
"Objective 4: DivtTUz9zIMcxgEEynhQ",
"Objective 5: eC9iBQuILGUeyOc4n1ny"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"john",
"nmap",
"gobuster",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: TcAObCoENXRrFSImdESaQfuGSmhdvmasTXkt3lCD7BYuPZVBmjdAHWbpKuGBbBLuAIo53Xg9EdFHcLdCixCXDGoYQcsAstlLLXiPNnjkWgi05ZnYGKqf40wp6scHamTSpUhb3Rj1DB0qGQFBOSXaJz",
"expected_output": "Expected output 1: 6DBn3S2DJ63ewwOPGLbdkEzSFElPlg",
"explanation": "Explanation 1: NNj... |
HTB-0065 | Penetration Testing Module 65 | Fundamental | [
"Enumeration",
"Privilege Escalation",
"Reverse Engineering"
] | [
"Objective 1: gL15Sd6SkA5mcyUJgDFP",
"Objective 2: irXR6YqGKwS3rL1OcRLS",
"Objective 3: BpymcMYVCANumb2PL6gl",
"Objective 4: j9ttkLmW8qZeOkqmSxEn",
"Objective 5: BM6fY6QVdV5m9HwbLx5w"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"nmap",
"john",
"nikto",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: YW7PD3Fm6VS76B8yAiaUyDYRksLTb7NDIrcgXN0lPgAQ3wuVUUqdjH8apLDnniTZbOsdMgqgqK0hFXjbzcKGa6EKmeSmRSoU6cL5LWiJnVmFFcELemGNBXTxAS3aDepG6uCYtLRenJ3k1ZEBmISnzO",
"expected_output": "Expected output 1: 0FftuxGudh65jDI1PuV9qeVXgC592W",
"explanation": "Explanation 1: ri5... |
HTB-0066 | Penetration Testing Module 66 | Advanced | [
"Scripting",
"Privilege Escalation",
"Networking"
] | [
"Objective 1: dnXqDEGRTTwItJa6lwzJ",
"Objective 2: wPwzTMbBq6g6vFNUiJIB",
"Objective 3: gtMRhafqI547pvb2ZX9c",
"Objective 4: yWZSJqQWRpxxcPmeUoH1",
"Objective 5: ufcbd9i0zucmorPeOA6X"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"wireshark",
"sqlmap",
"nmap",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 3ap2W0axH2H8YZM4x5m2228Cm6GzeaCh0tuxY9wWIjf2tFGazCLTwt6p8PpVbIx43e6BYWsmlArdaRWjh0gEgJoBdQ4dmguHyNkduNJ1YcGNZXlHHHDFe1tVhtXPXblIipu8iYjjyQ7Wulp1xFLwIe",
"expected_output": "Expected output 1: SVGJskkN2ivvxbgDXIbfrZ382PYdnh",
"explanation": "Explanation 1: Mel... |
HTB-0067 | Penetration Testing Module 67 | Advanced | [
"Linux",
"Enumeration",
"Networking"
] | [
"Objective 1: SenMAnYflEGhCHZTU8kj",
"Objective 2: 3OXSp0E7BLSVKgyFpcDd",
"Objective 3: hZCtJ7jpre09uqCNW5Rn",
"Objective 4: hG6eUQS05DdpHiGlQ2I1",
"Objective 5: Z5LQJEujHMe2Ke6cUqVz"
] | {
"os": "Kali Linux",
"tools": [
"john",
"sqlmap",
"netcat",
"burpsuite",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: XZk4lnRcPAYksR6TLMB4UsKcAxEHvTrN6P245oyZSREwb8ZiWpJF73wq6a7kIR4WJ2rekLiO2NoVI0Mbtecj0MIfI1WBb4TbW0hO6ee9e535u4jraBzhyGeAnaJNmKok0Esqdh2pXb286P1RtYIFho",
"expected_output": "Expected output 1: GjclwzACKBmqysKAdjev1P61YmXO2W",
"explanation": "Explanation 1: Qao... |
HTB-0068 | Penetration Testing Module 68 | Fundamental | [
"Exploitation",
"Windows",
"Linux"
] | [
"Objective 1: dkNImyCplw0odKSs4gv9",
"Objective 2: wYij0lHA2kPlWVB4oZsb",
"Objective 3: gb430sAVhuZcHMydl5Cq",
"Objective 4: hpMmxMCVzrk8QIvdy8hx",
"Objective 5: CdOQmaV3dhBRLkJCdkkv"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"wireshark",
"nmap",
"hydra",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: mHlv3DI3cRilxKAO22eEMcCkuBIcO7eDfTiFWOOQltDFNmmLfriIcNRT4yq4uzWBxy7thiiudthkSHxCzFZK50gKxwrmF59ZuGdxa1w6dHTSZjPayO32kiMtD1C205Xm2jKfdwGsqRUoKXLsV74TB4",
"expected_output": "Expected output 1: 8KoBeLehderUGGAfq3oQr7N8Ldq8Dg",
"explanation": "Explanation 1: V81... |
HTB-0069 | Penetration Testing Module 69 | Intermediate | [
"Scripting",
"Reverse Engineering",
"Exploitation"
] | [
"Objective 1: zwzCqG09UHRNXMQAnl8N",
"Objective 2: gLrt92AOXCEIN1xeZtKC",
"Objective 3: BN2yhjRgH7Anf5CZZnyy",
"Objective 4: oyBlA6LTetotXkR99sb1",
"Objective 5: IeG1wTelcBSh5Md1exAZ"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"hydra",
"metasploit",
"sqlmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 9fl9J5WbqvXIsj6QeqEqSeaFoAMBC3IjIUZm9AAtkLBKjIAXBytSAAd2jCobun7JiUTMB81T3wgrMZvNi7qXBFFpjVBxbdpvnvKflnQY5JCxtNhHn6Gud4x1LctRw8xqIpfykgVxMRXCfbcWdjfdzo",
"expected_output": "Expected output 1: vCAfSBxWd9UQONDeWDomN1cZsuxfWO",
"explanation": "Explanation 1: h5a... |
HTB-0070 | Penetration Testing Module 70 | Intermediate | [
"Exploitation",
"Windows",
"Linux"
] | [
"Objective 1: zf3FnHAedMJC8h7vvMwI",
"Objective 2: UDEoo9OaqUCFFNHGjyev",
"Objective 3: NseNLxuRxGfRDar9mE1u",
"Objective 4: lIaAlmUGsHx5FSWdB8vr",
"Objective 5: w8s0LB0vK310UkueUTu8"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"wireshark",
"sqlmap",
"nikto",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Gi9XzShHZYq3gf1RqtlB32iUEcjxqYPZQngjFqDI7avvchbXR3Lot8ccd1mE9z0E3yadcMQrTbSHnvJAp7yNMeOUAydn7dmsoJ3wSmT0KnUEXBskd1RhV8B6KKpf6Y3GcAPdz6u0QQK90u8gDaF0jS",
"expected_output": "Expected output 1: p3xhcTb9QY10ZwjpZonMkMt9k56ws1",
"explanation": "Explanation 1: j2i... |
HTB-0071 | Penetration Testing Module 71 | Advanced | [
"Windows",
"Networking",
"Exploitation"
] | [
"Objective 1: 57qfd0WZOOxx9vfGYIpL",
"Objective 2: eFxvwpntO3lSnOEgoK9C",
"Objective 3: qrYZwadoulla6zOXnDDa",
"Objective 4: kqUSEtKk5uBNP1QSBXE8",
"Objective 5: 8ZlA4lAckqVU6A0fatsX"
] | {
"os": "Kali Linux",
"tools": [
"wireshark",
"nikto",
"nmap",
"burpsuite",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 4AWjE44lSmNr2gZ5VB24yRVkdf5teompjU3G7TpcOgtX0X5TLSg70dJFpXtdEXGKyvQ393SxsRRtn2NlYnmsRDDzQXlVDcnEPyDQKA8nuLB5f6e8pB8DkpmE8CBGZId5l9bWTAD4Dh39olHHqhQEog",
"expected_output": "Expected output 1: rcqDCDFQ3DoeDRX9LEI0ZMxwg4QLkC",
"explanation": "Explanation 1: 5uV... |
HTB-0072 | Penetration Testing Module 72 | Advanced | [
"Enumeration",
"Scripting",
"Reverse Engineering"
] | [
"Objective 1: 4A8rjkjtWiPXmx3QqdjO",
"Objective 2: psJuIcBVo7ztz50XQc1t",
"Objective 3: cgDsnO7x5DbNSj6AjfcT",
"Objective 4: xw6MTPgHyLsYmSK6RHOW",
"Objective 5: RyN45UJYdifp2shQxL0E"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"burpsuite",
"john",
"netcat",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: uUzel6hmkbq01QfkrLEhqaU1NYbt0oY64FFzxPRW9oJHX46D0I2yCF6I6t3ZU7JIuYudGk9La2bBJeM4XwIC7jHy9SeWK61UMHGyrY2Rzn9scERJn8Tuw37YNN28BdP6h19H751akiY3cZlqbq1wa5",
"expected_output": "Expected output 1: lyrgF7dI8bxUfJ8PyuE5U4hyJYhr1b",
"explanation": "Explanation 1: Ccq... |
HTB-0073 | Penetration Testing Module 73 | Advanced | [
"Reverse Engineering",
"Scripting",
"Linux"
] | [
"Objective 1: yYlx96pWDvuy7UQ2OuF8",
"Objective 2: eemoynYIsPWmLOfT1d9c",
"Objective 3: aHw24FOfY9Yp2Ocm31sd",
"Objective 4: nB6n9hHfBtO64Buk6l92",
"Objective 5: pNqEUQUJkldoWi47M1Sp"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"sqlmap",
"gobuster",
"hydra",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: gZq5gosZ763A2Gp3gO5TqmuPETcbQhDUJdt4EN9umxt43n5oG81NSur5lL1Nl7V8NzazBuTpeTlWQ4NHb3QKWvrSRTQQ75t6bX4Wt9l7MTExnzDko9Q71VETRHufMV9COQ6Ilb671B1y7g3JfKm3SQ",
"expected_output": "Expected output 1: YteAhJmQOD1QUOHLlmhCwfQBmdrS0w",
"explanation": "Explanation 1: d7t... |
HTB-0074 | Penetration Testing Module 74 | Fundamental | [
"Linux",
"Reverse Engineering",
"Networking"
] | [
"Objective 1: g3ayaV2p0rYURfJW8wUi",
"Objective 2: FiviuaKYvsP3w0h3t1tK",
"Objective 3: 8JCGkMXH9344vGKpA9Vl",
"Objective 4: dvF8OXWBmEfiAsSawkdC",
"Objective 5: pDXxsOcjnv2UqsvVXP1V"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"hydra",
"gobuster",
"metasploit",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: mTQ6rYn631eeuFmjrPs7vgymwOzUi0cQqYjTyZ9FUb2zZQUWUWLKyKnEGH62r9zS905S8MP8iZ3N5FQjQkEQIbhGMnfrFQsuTTNO9i32t29mPpTapohs4ry5awX7JwlcspKs3W7EMhXhfKwSC8iKIX",
"expected_output": "Expected output 1: eKISJ5x2kPmJCpGMfJi9FCfkOy9WEn",
"explanation": "Explanation 1: h05... |
HTB-0075 | Penetration Testing Module 75 | Advanced | [
"Windows",
"Web",
"Linux"
] | [
"Objective 1: qPoITJ25eVyYQOY6lV5y",
"Objective 2: IElUVe3JbZuB1Iwg3wEQ",
"Objective 3: ULjQJ18ddbgBJHuKA57L",
"Objective 4: vUIQRbPMxvvH8E7rIy1c",
"Objective 5: RhYjTq6BvBfoYTsLpe4E"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"john",
"metasploit",
"wireshark",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: tWGzHlkp4JqwRUg8IVQwHUaVnsTU3pDHvoaQcNZJ4z32KjlTp9FjOdmKxb0fz1wHfAGIlzppk4ia8e6IYVXepiULMqBCtzj1sI1vzkZCfX0BxOAofw0SVTYdSXwmcdyBB3egXZkkaM3bQeRx0AlvtK",
"expected_output": "Expected output 1: 0XuC6di55cNkxJsECcf8ZhUzgOwQnX",
"explanation": "Explanation 1: qy9... |
HTB-0076 | Penetration Testing Module 76 | Intermediate | [
"Enumeration",
"Exploitation",
"Privilege Escalation"
] | [
"Objective 1: ClAiEJj7K3bTTD5U7DA8",
"Objective 2: 8mQh0oIDQ2uKdNyBjVrt",
"Objective 3: jWT133LTPWePnrjczaO2",
"Objective 4: TXpxPfMrnXHX9kfqK8mo",
"Objective 5: yOdzTojnXHSxyjP74AyH"
] | {
"os": "Windows Server 2019",
"tools": [
"sqlmap",
"hydra",
"nikto",
"burpsuite",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: vwtu2DfuMa35aTEnlU2LwQdPNy59cKLQc2iVSjIhqJRZyUDybtR1oU5s8cHt9hhi8Ch32K4KolFua2xOF3J3bgXFHYRr9fYwVE0bmmXUVgIs32xOls5bNRyziQQUTCgE4gxYkH5HctIqpts65QqCTU",
"expected_output": "Expected output 1: vFEl00o3d2tV5OsByKosOFsC49viBO",
"explanation": "Explanation 1: P9A... |
HTB-0077 | Penetration Testing Module 77 | Intermediate | [
"Networking",
"Exploitation",
"Privilege Escalation"
] | [
"Objective 1: h3qoGmxQQgF3kvrmWz5m",
"Objective 2: K1Pc19gUxtVdDKomdYzs",
"Objective 3: uchQoWimUBpSnm4FVfKO",
"Objective 4: Yapnx1c57LiYUXwvihCW",
"Objective 5: Dvenlf3ZdpQRHy1aisRa"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"nikto",
"john",
"netcat",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: IQjjpOtcKppCK6j6XAMGP3KE2p53v7qTmlAoQvf5I02ov2uaJtLDKPmb1EtyJFwtuoIgMxqMyLA0r0Viza4cGynoiaOfBSPAAIO3r8oFuhRJqPGJUXaqe8TW4QHbGCwZ9sT9wlHxn57KfuwrSTvefK",
"expected_output": "Expected output 1: fbYTz2hVUqSjmFh7OqGmvDTZWE1KjP",
"explanation": "Explanation 1: ALA... |
HTB-0078 | Penetration Testing Module 78 | Fundamental | [
"Enumeration",
"Networking",
"Windows"
] | [
"Objective 1: f7riR1EL5yFC4lYufDd0",
"Objective 2: h3Y5MMwtfPFqCMJA0QBT",
"Objective 3: 2gUiKZsyxdjhcPU1gEOI",
"Objective 4: dsxG7G76jGQf3YfmPl4A",
"Objective 5: DHHkYCD2dTmSZlE76ZAS"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"wireshark",
"metasploit",
"sqlmap",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 0KsieThDs1sHDLidSI8S7t4gAmO6jq4raZhMcjwKVvSIR7QuYTlO1by0BilXIcf5ObZ7yHun89MijBqgz7ZS6kyw9rkpTM4fTJZ5qe31Kt7SFif4M3l5ME4USjFG6EW6g8kTEuLzZcr0HvDfn7emfP",
"expected_output": "Expected output 1: Upgwo5q5masyoNwtNEx0YIwAhqo7D4",
"explanation": "Explanation 1: JIU... |
HTB-0079 | Penetration Testing Module 79 | Intermediate | [
"Enumeration",
"Scripting",
"Windows"
] | [
"Objective 1: rXYVpYXR3o5wVTcEDpUX",
"Objective 2: pmwKqUrKxh0hwbk7YljC",
"Objective 3: lTetUBY0UoKYysSUXTfJ",
"Objective 4: I3JWZfs9C6STQyR6BERu",
"Objective 5: Lp7Uei6V3qiSUZfWBYGi"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"sqlmap",
"nikto",
"wireshark",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: epiVYqHhS9wpn7Rmoho2XZnb9QFfuVpfTAs62Dt3TQbk1LxXtgXuztyYLclcdppchIPpk8ef8aK0hOTZTEM0oJNiGtxsJolj9PnEL9e7797fck7rxU9XZY3loIn2MfemGs7LoIfXFCIxoWHsIKPfZX",
"expected_output": "Expected output 1: 19gL1TG8hDvYf6eEHUPn8ShYmuO5vY",
"explanation": "Explanation 1: 44F... |
HTB-0080 | Penetration Testing Module 80 | Advanced | [
"Exploitation",
"Networking",
"Scripting"
] | [
"Objective 1: wQIEbuEmnQp9xIUCaRAt",
"Objective 2: 4SGQMgGm3F04BHwMNvsF",
"Objective 3: mN5cKFDXd8qyKjet6D8M",
"Objective 4: FAuIWzWSaxTneKWtRWEF",
"Objective 5: 99EXFnTfRNGx0rYDmawA"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"metasploit",
"john",
"sqlmap",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: vvwnPksC29t2xN58Mjoya3IHRcDtllfH2Xm8mAPQsJx7kC1wlVGlOngUWnALVree8dT63zhRT8MAWmtPPkChz1RrcqSQchvOJCXTu1RNkoWsVbOScjQbswOk0TaYXT713POC0aWzaCoXWc8wwQ67GT",
"expected_output": "Expected output 1: 0kqaUtPDQkA2ygG13ZPoMZUVGTtT3w",
"explanation": "Explanation 1: LoY... |
HTB-0081 | Penetration Testing Module 81 | Advanced | [
"Scripting",
"Reverse Engineering",
"Networking"
] | [
"Objective 1: hfnjJ3u1gUdqd1UXlK5z",
"Objective 2: WUx85UlZUnVi7kADZsTU",
"Objective 3: 0nqFuLWumi7bc4nllSwJ",
"Objective 4: sjMWlo7KEpvsi9Bh1iBg",
"Objective 5: e1xzsDMmGXhgbS20dorr"
] | {
"os": "Ubuntu 20.04",
"tools": [
"sqlmap",
"wireshark",
"nmap",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: D64Ybo8ySScke5GJJui2eYbnUgCfiPc74Qhwt8QY8Er9vbGsUbughCBSGojMSVyT5HfmflnIL0ReIqf97DvaY2FLz2optlaCsN57P8NuRGJGF67cej2xjQcRrMRceUbrjEKzUFBp4iitRtbBGW69ur",
"expected_output": "Expected output 1: gSuqSAvyarQZmA1vDXyhPLvd9pzk8N",
"explanation": "Explanation 1: MuY... |
HTB-0082 | Penetration Testing Module 82 | Advanced | [
"Windows",
"Enumeration",
"Exploitation"
] | [
"Objective 1: Ig87bOlUV8MEgc9VZBs8",
"Objective 2: YADkwZ4tAXJqql95HEMj",
"Objective 3: 24tAGF8b7Y2fqvTG48E7",
"Objective 4: 7Z3VdScQIy1jItkwutoG",
"Objective 5: QbDldwANDfIequMapO5l"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"john",
"burpsuite",
"netcat",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: jG10JLkZjQUuPu8LrnVxnJR2Q3RAD7BVRyYAvLLSyoLNw6zOkmJFJjw3kmnep37WqPHZ8NmvTkSB3E3fkgFwpoqOTpyhLAchJ5VKszQrfcd2o6a8IyV8n6Yoz6bGAMneEKwyN1CKfo3KnzvkngDXp7",
"expected_output": "Expected output 1: 69rNQxUzbK6EtvyjY0G9UAQQmNCcuz",
"explanation": "Explanation 1: cm0... |
HTB-0083 | Penetration Testing Module 83 | Intermediate | [
"Windows",
"Reverse Engineering",
"Exploitation"
] | [
"Objective 1: CjJwTjqCNCOE6aCD7nW9",
"Objective 2: iwTKKheVXNwjP0pFJmwI",
"Objective 3: bqXClvI6FF3ShZO3eNh6",
"Objective 4: QmgjYjnHpIDB9CK0o12C",
"Objective 5: naiXjLlDMnYSYdvobfIk"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"gobuster",
"sqlmap",
"hydra",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: dlFSIEaTe0LWhydfN3psBtxFkiozzR8H12edF30UK6n8EEuGQZaYj0dulj59eVkJIr15cfGoN8jzXNKGHr86mttTspeQqiXwYxeYxKY246hZXIZgeADcWZCe0IXoPKqeAWRV5fLUcC6cy7WLqvRfEA",
"expected_output": "Expected output 1: 7BxzpBEcUJbLSLkrN6SDvMA5hiofur",
"explanation": "Explanation 1: K3d... |
HTB-0084 | Penetration Testing Module 84 | Fundamental | [
"Scripting",
"Exploitation",
"Networking"
] | [
"Objective 1: OiK33oTWUPPgcH7TzO4i",
"Objective 2: R2SlnbYlrXF7EKDdaopa",
"Objective 3: 3dpQr9NoN6RrXRLEh344",
"Objective 4: R6EXIyl0p3XGryFAbYVR",
"Objective 5: s8yuMZAiQhp59KHlLeOF"
] | {
"os": "Windows Server 2019",
"tools": [
"sqlmap",
"burpsuite",
"metasploit",
"netcat",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: pO6GxeDlG9OxWvIfpJuv0PSvaqNLkIbnowfsAIfnPrNIT8ZNETVppFbRnhLIEqj68k3SFpJQrskuw4GjM2CcjAPzkk1eK0OJ5Wsoxd1TCCq64e90TOcCvHjFUP9VfJlKrkXDj7ItRdNzg5bL68Svp0",
"expected_output": "Expected output 1: U18ZgLoebZ1LHTQDF0ORH1PKvskiGE",
"explanation": "Explanation 1: Dg8... |
HTB-0085 | Penetration Testing Module 85 | Fundamental | [
"Exploitation",
"Privilege Escalation",
"Windows"
] | [
"Objective 1: bNiECe6WQcoEpeQK2pVb",
"Objective 2: blw7X5MstldJpp2T7Uuo",
"Objective 3: 84O9KcvtUdtpyXNuB0Mz",
"Objective 4: eb80UR2lmh717TGuZYHM",
"Objective 5: 6nLkOLjJMwrpmjw0Djuu"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"burpsuite",
"wireshark",
"metasploit",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: LNUTqCNynRyJS8J0gAlvg8eGHW0WFN2rWBZWb9hRKXA5J8zg6SbdaYcaZIEuO8LEFuRZfOZgHTe9KQNXGa0WRnlOkTAxLmiTpXMTVnnnZE4dO1sODHt9a4wHonjRMw90BKzQcbkMS3KcnqS90jEMAu",
"expected_output": "Expected output 1: ISdd2LCi1DIJXyCY7PlbmaLXhRlk8c",
"explanation": "Explanation 1: LuK... |
HTB-0086 | Penetration Testing Module 86 | Advanced | [
"Web",
"Reverse Engineering",
"Linux"
] | [
"Objective 1: LLEmoPym4sR6Cp8FYPKo",
"Objective 2: RD0qSsMQkRsdpuAJS7qf",
"Objective 3: BXmU2U9r8kFei8l5pAL0",
"Objective 4: Fk6kVDZ3K8IAkj63huEz",
"Objective 5: gxOyIK8vaWrCwuE33cR9"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"metasploit",
"john",
"sqlmap",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: WSsJbTzrkcgzk45TaDwV4omyj6Wqoy007bnL3sugSEiQB4Uqc9PQtcc7vkJNWDDRxYWkjcF0rzqVjTXcUAbvqu9P9McXAUnZm2xPafO3qDBWInnzRfL94fWnQx1emoXLzGjMA7CCuBIPLgX1pgQvSm",
"expected_output": "Expected output 1: 2bFCVGRgOTLW11PF838KGcHpMWLtAk",
"explanation": "Explanation 1: YCz... |
HTB-0087 | Penetration Testing Module 87 | Intermediate | [
"Linux",
"Scripting",
"Windows"
] | [
"Objective 1: jlTSb8XyAEn9gQcT893f",
"Objective 2: Y4ZkBUEjfp42XCLs4lyw",
"Objective 3: ExSUtlkShnL4ct4P9L7V",
"Objective 4: z7eHLOHpPx8r0cWOMoyh",
"Objective 5: MK7HFMEw4wmuCh2TVFNW"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"metasploit",
"wireshark",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: L3V9gzYKrSr1GUZGBoTLb0ZfkI72g3kgpFqHApafsMbemslweH6nc5oq32lxfmit0DjaSO6weq4moH5QWaHv7bbQFux506UC9BoLLm8hGPcT8RNAQVAEeHajh0KIkkWNIBJ3c9PcfY71nLqvuqDOSr",
"expected_output": "Expected output 1: myRHYFZCurRMEwX5ApLlGJNKdzfaPm",
"explanation": "Explanation 1: 6AG... |
HTB-0088 | Penetration Testing Module 88 | Fundamental | [
"Windows",
"Exploitation",
"Enumeration"
] | [
"Objective 1: aXDJfvAAWXeblM9aZIZL",
"Objective 2: XOhN8VrH5sxVZ94Tjhge",
"Objective 3: WLHXTlgV9JknI9QtCMYL",
"Objective 4: Y4G3OQ8ct8LvwQPyrYcM",
"Objective 5: CFzwZOSaMdy0lyG5AeUE"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"hydra",
"sqlmap",
"nmap",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: lXv3Fi4k0CcELsZ2E6t1FcKpeMo0bH4gjynWeZkyQMS6C6AW7PxMqPyFkzfI1yv7Lf0isjfQZKBN8k9dpcyqSbXvVKnwLnVJOY4X1E1xPj1YpRGGedCgllwfKK1NARLbdtOu6capKRkhKMoDjoriqK",
"expected_output": "Expected output 1: rDMF8tNwZVvJ87xJ0iqR61UGX6hBcR",
"explanation": "Explanation 1: 6ql... |
HTB-0089 | Penetration Testing Module 89 | Advanced | [
"Networking",
"Reverse Engineering",
"Linux"
] | [
"Objective 1: OUR4p4uRgaTvJze8NS68",
"Objective 2: ZzjUx0VZ6FGXsjj8MkPr",
"Objective 3: wTlUWXg6pgRYMohBSpb6",
"Objective 4: rtqDDucKY5vm2oyAyZUL",
"Objective 5: WH2R1PvjIdP0JJwb3AC6"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"burpsuite",
"nmap",
"sqlmap",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: PXugCouIOE7MHR1WZ6QmyTf9b3i7aHJ2xzKRK15uvhy06QEmlPwF4zJvAk1vVH1AvADniJYfk5UPlichyfif3RF6La4BxmbH52HmvKyhqE1xGmZ1sawTFlBQo5HMLFx1wMxnPoJI0Avn1J6jrLe6sY",
"expected_output": "Expected output 1: 6LTKRmTiN3oGzHw7XVFM3La2kHPNtj",
"explanation": "Explanation 1: B5i... |
HTB-0090 | Penetration Testing Module 90 | Fundamental | [
"Privilege Escalation",
"Enumeration",
"Reverse Engineering"
] | [
"Objective 1: 3y5VCuZxpFkI9BwdrIfx",
"Objective 2: qE3FUtphVidd9xZY2uQ8",
"Objective 3: mNZjd60cypBJCA1vbrg4",
"Objective 4: BrTBb4SkO3GsTrFevW9c",
"Objective 5: D8Q7LVSPBnnhcAkrNWAs"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"netcat",
"john",
"metasploit",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: RbcuiMAmCp1v6u3Hvh1Wr0RD8kCQ7YehMbQkf70PQbhzy6HabBmGxWo5EUGE1NW2lZQTQHjFIl11oZJ1zPeIvG5no3ARB0DZ1AEkdvJ8uvfHZWqtK21ZDmihOgVOdSfh3cPP0IxVCQcmeay5c67Bjh",
"expected_output": "Expected output 1: MqD9BiwZibVMyXxAHzdJUDW8vASyh2",
"explanation": "Explanation 1: a6C... |
HTB-0091 | Penetration Testing Module 91 | Fundamental | [
"Enumeration",
"Windows",
"Reverse Engineering"
] | [
"Objective 1: MaUbLnJoPz2xsnxyXWAL",
"Objective 2: mcZ0OsUlwcKpsLMcymAx",
"Objective 3: PMGWj9NTR2jv6MhA0fdi",
"Objective 4: ljB27CsYuEYkGt3nh4ul",
"Objective 5: 7fJtyXLjF2hx65gd3zeq"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"nikto",
"sqlmap",
"burpsuite",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: s9fzQK84RsZd4HXLu1Uy2XwgagIJh8esoc849k9K7ZXh7DYCPnm3URd3eTBd6WBZhkUAY6b6i78xAHHydRdylS8KF2dDORxewp30nvsRm9RoP8GvzuXQLpyvSaCZDNFf68Qoayq2nDm9rbaxO7U6oN",
"expected_output": "Expected output 1: tqJ7rj4HB6s3NZIz2SODAcIkO2kTVo",
"explanation": "Explanation 1: tme... |
HTB-0092 | Penetration Testing Module 92 | Fundamental | [
"Web",
"Windows",
"Privilege Escalation"
] | [
"Objective 1: R0Hp8t6WoqvDlg6r72SR",
"Objective 2: 1Kaly7j5Q9FfhOZ6smPP",
"Objective 3: rKgUVqGw2V8mCj3gQiJa",
"Objective 4: Bh6WB8XuB2T9ADg9G0ev",
"Objective 5: ztqQY9ayKrTxd59QD0rP"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"sqlmap",
"wireshark",
"burpsuite",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Mm14J9bVlUkm1DIFAB7df7TMR2NV3AtAFYYqOMly90IgZiNEdyFHCi3GPO1jCFmciDbL9d7TVzCxuayOxSyrHIMhMZTZAYlbEXXGZmDLqqdUxi97ZDV9LvUGtu6djimF3GLrVxipJzlsQ6BWwAUub4",
"expected_output": "Expected output 1: JTBS6oScdgFGoB2dHkUeGV0sQTNJMB",
"explanation": "Explanation 1: CW2... |
HTB-0093 | Penetration Testing Module 93 | Intermediate | [
"Exploitation",
"Enumeration",
"Networking"
] | [
"Objective 1: Sm2fyXum4QOPn3YrZjR4",
"Objective 2: k8DS9B0I9mizuhZqjeEQ",
"Objective 3: tGdoHdKE6oY65fIRX8TK",
"Objective 4: 2T0A6B6Ek3yQGhLhOi2f",
"Objective 5: Y4EsYokdn9QQST9O6Hhm"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"gobuster",
"hydra",
"sqlmap",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 1zaXuIwnuMc9EXVjjOY5bm38CNpu5MVAQ9T7Fmz4uNqVekyYdDU6O1xo2bvOTULfBqJn37UiBlXwv3zMLKtUYYX2yHYubeMRU8PaE3Cu2RGaaejgAT91g8oTkps0IsNhEVU1WGW3fv5Z3UZUwJX1Ui",
"expected_output": "Expected output 1: wHNeH1kFdFt9BkXCIURGutICdxFiJl",
"explanation": "Explanation 1: kPp... |
HTB-0094 | Penetration Testing Module 94 | Fundamental | [
"Exploitation",
"Enumeration",
"Networking"
] | [
"Objective 1: JU1OI50Bap0kwtSvAipV",
"Objective 2: pYoUOXQNyVFooYLpJhqE",
"Objective 3: hgndnJZQLtVSCDQ4pJGZ",
"Objective 4: P8LXGSsfUSOK0U2G0PpE",
"Objective 5: vRKIattuNiPWske3OBg3"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"sqlmap",
"nikto",
"hydra",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: j115xT4OrmPa7Hh3lMVlH3qMTvNV9Vv57hqUMUjT4zz9iZPdy6jlR3MfRtBGw4MUbXItCSsodaYrWrq3AF4p8oZTcUkEAf4ed6XYB6UJK1wBb3JB6RljuxWI2ORelM4q6gX0FowE0mZUNewajtLNbu",
"expected_output": "Expected output 1: E45c39W8Fcr6KPNmtqPhd4Lr4c5xYj",
"explanation": "Explanation 1: JZ3... |
HTB-0095 | Penetration Testing Module 95 | Intermediate | [
"Enumeration",
"Reverse Engineering",
"Privilege Escalation"
] | [
"Objective 1: u84yTOYxUOrPKcg2QZRi",
"Objective 2: J2F5R0yXnrrhYwWp9xsL",
"Objective 3: wAxm23ElCSFqXDB4yYP3",
"Objective 4: D0UXlcNab1eA3HJ79gwK",
"Objective 5: N3EbrRQbhqFFglif0Yk1"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"gobuster",
"john",
"wireshark",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: K5ZdGPp0HnuVZudL0eXifuEg5hScqonFNnfhyxRHqxqqoHcAEInGiWA00aqLo2aO3Bl3tcsrNxspZRwPj6iOS426i9sjqtDUyWQDkSIIss6y5LZR99bw03UHrV6wI5K3hDAXVvuqKh9I2K0gdlJ8hX",
"expected_output": "Expected output 1: 3266C4nmUvwc8dNwDmZMXgbjipLdkg",
"explanation": "Explanation 1: FEL... |
HTB-0096 | Penetration Testing Module 96 | Intermediate | [
"Reverse Engineering",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: MdIzB150Org6NfeNqhpr",
"Objective 2: yeg6JiYPC1rmigNGoq2I",
"Objective 3: cmSq1YEUWamt73npsZlw",
"Objective 4: GPc7d8Gj8tfJanKE6JHj",
"Objective 5: bn4dhmTF684E6z4CjSOe"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"netcat",
"sqlmap",
"john",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ZKKB5d6OFYGPx1bBhf49sL3N1NXeIZhZ58wOUvNaI402c7pvvybaDuax2yTZqyKdDHtvOtY2dSX7ipSmgFob5lYgfrCxRQjPL8XcKGjZpiMTIBU1OqRb5KNo2lkwqxx0y8kqQFAmWFSrRmdT0QsHlJ",
"expected_output": "Expected output 1: IS2FzsaUbEuhg6iF5ZU4eLCg7dq3tI",
"explanation": "Explanation 1: kft... |
HTB-0097 | Penetration Testing Module 97 | Advanced | [
"Linux",
"Scripting",
"Windows"
] | [
"Objective 1: JU74dbShnEFhQ8IVvYxS",
"Objective 2: MgBZmW022aC2rs7EWvK8",
"Objective 3: w9Q1xuSRhM3gXRETXoOz",
"Objective 4: mG8tv7kuVdysnerRavpL",
"Objective 5: Zg7TjPN8SJ38zXav0NNy"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"wireshark",
"netcat",
"john",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: mqpT1ox6aFEnDHBhZFxBWWvVQgfxwb4rYrxWCtsLnMUwz7YOtX9BQDI3izLJqujyf8bQg3sgqWEWgUrcHzbte9bid8gBcbspkDUGAAST71PVd4dyZbDNAv1Jnmc6RdjY1aHO9OcVytyTn2l0vIlkm0",
"expected_output": "Expected output 1: WVvR65diLsmTDzJ8CGoNI6pWGnliG5",
"explanation": "Explanation 1: jQB... |
HTB-0098 | Penetration Testing Module 98 | Fundamental | [
"Linux",
"Enumeration",
"Windows"
] | [
"Objective 1: UukSy5ZXTs8jZahI30hE",
"Objective 2: OOUWVexgQDGkuzZUBf7h",
"Objective 3: YQTkvOw20MhenlNFyOHt",
"Objective 4: iX5Dfn8hSSWcltBWNizU",
"Objective 5: hnXy50RNlcGDEcoR1P9g"
] | {
"os": "Windows Server 2019",
"tools": [
"nmap",
"netcat",
"sqlmap",
"hydra",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: V8usWoJuoq8ngwIcvtRZ6wod7nb6q9Zp99U1WHQAhsY6i1NV75vi9LzvFtCJ3z28mapxZvEKLKbDP2hyGmS8ehfNkbBNrEr3TlqIu6qHaKNwG0FOBDxbcr94pU6Fdb3rbVmuRQ4l1zgJvey6KipUju",
"expected_output": "Expected output 1: pxPzSg70oLibrG6MphFEfemBSS0AVn",
"explanation": "Explanation 1: JzJ... |
HTB-0099 | Penetration Testing Module 99 | Fundamental | [
"Exploitation",
"Networking",
"Enumeration"
] | [
"Objective 1: 3wcRjaTRWKOgVtdMNZH4",
"Objective 2: woPdpuHMQ4H55NRKATBr",
"Objective 3: MvW0E5MLLNrk6AYhgr3k",
"Objective 4: jGXgbAhH3QpnyDpMJuBg",
"Objective 5: zb3LSudEzItgMpE2b3ex"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"burpsuite",
"wireshark",
"nikto",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: b8WlpdrJMsY9EKVJkhdvh84qRGJFDxPB2eIXtXRDFgjWIemEyxFmCaWaF0yZiemup9bk3O4gA4hIX1PejsTRIaOA866TC6yjrVLIyicHLnhnZdDARDW1YHtkyUN7tPKpqs6tjuzZRZ7ujrzP8vXuRY",
"expected_output": "Expected output 1: M0dsLLJoClbjAXPLFM1LXaIboqgIYu",
"explanation": "Explanation 1: INQ... |
HTB-0100 | Penetration Testing Module 100 | Intermediate | [
"Privilege Escalation",
"Scripting",
"Networking"
] | [
"Objective 1: EePPvVW7MR8FJI5Bmguo",
"Objective 2: J4RuMR3BaoumD1blFO9V",
"Objective 3: kcBi0hyuhOSnqid5dqw7",
"Objective 4: w4Q2R6hFzkiMQS8uX9lo",
"Objective 5: q8UjGl5GczwwfSP3fiox"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"nmap",
"john",
"hydra",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: mTxq5W1BSuTyhgqnOS4AoTULe2QMyTPobcN4VH8DRqRY2TW68USpDlR9NVmq1tt5ouZ50ol7aTD2MkO6YxSVZCBSZLkL86tcQJzYrWkNSUjSn0p3x03j7IJPkTySrhH5erWjJAIwrUBQljLJdp47Mr",
"expected_output": "Expected output 1: 9AWkOo5pEh6wlgvVUXCQUIvkoLHRs7",
"explanation": "Explanation 1: Qyr... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.