module_id
string
title
string
difficulty
string
tags
list
objectives
list
environment
dict
tasks
list
HTB-0001
Penetration Testing Module 1
Fundamental
[ "Enumeration", "Exploitation", "Scripting" ]
[ "Objective 1: zg0k5701EsL8uFsCxyKK", "Objective 2: 1OysSCGPHUS9H419kHnA", "Objective 3: T5y76jEUpA2Sei3P1Wya", "Objective 4: tFe75d9uxlRzaN4uubdP", "Objective 5: TW4sbHMUfY81OUO48e84" ]
{ "os": "Kali Linux", "tools": [ "john", "metasploit", "hydra", "nmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 7N7AuvFYL6xJDItxb8OIFka5KdUZfISF1ivYG9aaR3LpjU0yMxXbq9Sq861wigVvi021vckVdmrnoSBAqLS1eALonAiPZCKSLWbnaUTD5vf826OsLuLovDL9l0N2IALhnkosuDMXuvWrgnCMkqNbP7", "expected_output": "Expected output 1: MXZNhlN5nd0a64c8mdP8567Ng663vS", "explanation": "Explanation 1: A4t...
HTB-0002
Penetration Testing Module 2
Intermediate
[ "Enumeration", "Reverse Engineering", "Linux" ]
[ "Objective 1: r7FV2dvK1MHm2LkEzR3o", "Objective 2: R9C1B44ftGLXMGGceIid", "Objective 3: 2BXsZAY45rQKIpYOhUxV", "Objective 4: RFCUpQJmtZthOxdKJ9o2", "Objective 5: ESp9Ce3K7WgEb9NcaZCB" ]
{ "os": "Kali Linux", "tools": [ "john", "netcat", "metasploit", "sqlmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: 4iEqeYW4KDe9QMlmA0owm0XNEYMnP2DvbGXCEet9rO3m19hRNhFLTf9INFzn1DOwGXLfBCwtWosXQMdFVEZS3gtkPnk1cCTxChGa8ANN15iPgYLr2MZSzEblz7qUHpcBwUay77sYWTvJ5ReKXe6P21", "expected_output": "Expected output 1: 0TepombSvKRn3C4sPRYADCoqetRIwg", "explanation": "Explanation 1: J5S...
HTB-0003
Penetration Testing Module 3
Intermediate
[ "Reverse Engineering", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: CGMDo72pA9qQ5TOfxFn2", "Objective 2: YDcptJerOJSK0Qck2HWa", "Objective 3: OBidxpXdUZdC4evh5LLD", "Objective 4: XbMvhnJWHCwgN8NynKlp", "Objective 5: xL5SCyi9xA6cH9x4mVhp" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "nmap", "sqlmap", "metasploit", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: Tw9R1iVBUt5b1PemHmzXlTjcfA7jARCg5AwjuJi01IRE2t5px2HP1YBIsdaIHmqoiS9R480ROcHeoST9y5juRAEloJ1To9qlDdpmPKt6TJkQjtX4nBltyQlRv25zeN0E1pk4g12HCknHtAfdAoucEO", "expected_output": "Expected output 1: NH5zEbNksXepK9GWZtQYiniurhqRgs", "explanation": "Explanation 1: 2xd...
HTB-0004
Penetration Testing Module 4
Intermediate
[ "Linux", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: ofNPh3aJxq8T1O2l0LDq", "Objective 2: 67Fn2u97th4d5EGrnPVc", "Objective 3: wq7AOFwsduZxF9pGUuWU", "Objective 4: T1oHOav82TUzrY6EuAxv", "Objective 5: 4Bwyu5bw9O5jueK2q9vK" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "sqlmap", "john", "gobuster", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: IW9djy4n7VVU8pwXdsGny6hxu1OWOVy0fzo4ep4tMEZdxLWazrEqFqroEaVimtDZUPOvjEVRGXydOH9gvl3WQz8D95JFbf72hagIwcDHgLlkZqekkSb1q4axmqb7KcvvceC9AvEfAA54GLZILD7uud", "expected_output": "Expected output 1: 6mTqrdQOiaDcRLGmRdGj8cGLnvJGRu", "explanation": "Explanation 1: R8Q...
HTB-0005
Penetration Testing Module 5
Advanced
[ "Privilege Escalation", "Scripting", "Windows" ]
[ "Objective 1: WsfDfKrmvWLV3MYbf9n4", "Objective 2: PoW4SE2MP7VjfT5TPuSc", "Objective 3: bC8TYTCeKoRgKCxAgDkJ", "Objective 4: cvI1q3WhcEnuRczuGqqn", "Objective 5: 4GOion5acgIazigGgNuS" ]
{ "os": "Kali Linux", "tools": [ "netcat", "gobuster", "nikto", "metasploit", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: czhIO8Cbp2JMsRFjmHZ1nzwbulqyYUAMmiYk0QOY0Gtka3jfH62nePq5mJmkZgP0ExoQpAaGwzWpC2CAdAy6A8zSrEfZ24893jFNdjKMyvAFWaf2ZvaEd9e6gzGIkgxubUbkK8x7SGYJLBUyjQF0QM", "expected_output": "Expected output 1: OzRifxSgRIAQ6jEZgjI2uFpHzDUUE2", "explanation": "Explanation 1: mom...
HTB-0006
Penetration Testing Module 6
Intermediate
[ "Privilege Escalation", "Reverse Engineering", "Scripting" ]
[ "Objective 1: z90bHqEWPBVMrADJBytF", "Objective 2: tsR4vfESy2IBeuRSZHVB", "Objective 3: 1Vm9nRM8oofjO0zv9h9S", "Objective 4: v7obZqLkDgCRxGqEiebp", "Objective 5: QKaZgWX3W34M3seYJL7M" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "nikto", "wireshark", "sqlmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: TkswoyMFxr3oGIWxcbZSQSOeNHh5huEyddWrZ3mgha7hQPwNrGqt7wL5L5nCPVJbJj6oZDnNxN4OUt1B5dYNrUizhWqWjUmVD5oKhGio25zUo1tAF0v8Vut8EAEvPX1OEfkdCAEJN5PboPY5O53QOQ", "expected_output": "Expected output 1: xqWWMnsGYY2MKcPLog9WGWhjCGbp5E", "explanation": "Explanation 1: XTL...
HTB-0007
Penetration Testing Module 7
Advanced
[ "Privilege Escalation", "Windows", "Networking" ]
[ "Objective 1: Xhj6QK04Rha4vBD2rcM5", "Objective 2: GoWBk7EEu6tg7LQUHIsX", "Objective 3: e9SgpvclYq70qgm5TQyw", "Objective 4: nRq95uVw1Ut9pHbqELCB", "Objective 5: IE7yvf5GvizAQh5Axy8y" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "hydra", "metasploit", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: I31soOo8mnEkuBt0FewqhDhLCbUvlz28EyOAoDQY4Ks2IaoYMRNpZEs10mAF8g5T2plbeMggUAKqwDlhdOmaxUjbPvm4OMJ6OuhqR9KoLD6KOrQeA0VVqXNKUZWeQ7rHtvbu0zTDlt9VZ7CtA8HrHz", "expected_output": "Expected output 1: uzqDXhf6VIJ1Kb7XluxH83OduSiU9P", "explanation": "Explanation 1: BfR...
HTB-0008
Penetration Testing Module 8
Advanced
[ "Privilege Escalation", "Enumeration", "Web" ]
[ "Objective 1: LWnRufNNz5g0bWT4Nevb", "Objective 2: INXyZrOXk6Dp7iSzPEFe", "Objective 3: ph1kTHCc4HI6apkCf1YT", "Objective 4: GJEFiAydjN4TymKK50cF", "Objective 5: 26jl4wLOXGoyVTlIe7zq" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "hydra", "burpsuite", "wireshark", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: lou8eZMjy9HJIoYMtpSZU5z72l2bRs9LNltUbBU5WDWM9wjcafKY8pQSleAmC3bpTI0ro7ryIGeaIvCXsYuO7zsIHrGRvWYEGriwE0tCiJxkhXNrn64V6POS6UBsBmciU4lZgyE6jiomoHlHYiqn6A", "expected_output": "Expected output 1: iPExUK7KdVdkPD8YpIOxUrsQPuOjll", "explanation": "Explanation 1: ggg...
HTB-0009
Penetration Testing Module 9
Intermediate
[ "Scripting", "Exploitation", "Linux" ]
[ "Objective 1: 7rYlGz4ltR9trR9dnLyj", "Objective 2: w6JIoRpSMsTWfpJ7N8nZ", "Objective 3: uFINy8bTjCJuvlMwqa5P", "Objective 4: UHhyNprf7qFWNDFu3L07", "Objective 5: fThqUaqKLTcdQQeEyYqV" ]
{ "os": "Windows Server 2019", "tools": [ "john", "wireshark", "hydra", "nmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: SmimDT5zUFgpWqQQWhPHtzmxvBzwysLgBzPxtzLMn3xtpazvOw5jWHdDQEf89A1VhM6SCu7SxoBNGzBHDUFLPmfFYxMdS47y8rUeCbxAEph5kMJy9fEhcuUugIupj3ZVEUSzUAJXYHD2TRYSRYMMe6", "expected_output": "Expected output 1: 2oPho184t5hTGCCMv4mZ5VpDhywbu0", "explanation": "Explanation 1: JNv...
HTB-0010
Penetration Testing Module 10
Fundamental
[ "Networking", "Web", "Enumeration" ]
[ "Objective 1: 3yv1dYy6AReJSfJCR3S2", "Objective 2: V1i52SVcwr8Fsratbg49", "Objective 3: Sd2LhBET19zn0bSjjjFJ", "Objective 4: rAmqFhp2D87QMitCERgC", "Objective 5: h8Wsxhr8xPnVGnrQUdkj" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "hydra", "netcat", "metasploit", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: S0mID8UqflsF1WxywHLcRtXYWmnkERtMgCVxQMY78fltxorBMZK4yhHblbVTNc3EKib8mQbvu8FKd03EI7aED6TZJsbSFO5M4Z9mx2kDYBYMt2sFbKbjqypAUeQ9UBRY0jRqwuBwBsUD3WU1gOACtL", "expected_output": "Expected output 1: m1HctxKSxCPd3ylZ4neCZeqWBOtdoX", "explanation": "Explanation 1: rZm...
HTB-0011
Penetration Testing Module 11
Advanced
[ "Linux", "Exploitation", "Privilege Escalation" ]
[ "Objective 1: DpNuOMePPP3oMWkZaOxA", "Objective 2: gmUPY1a05ygXj8B1XDv8", "Objective 3: teAgPOyhUmydHrnQdtst", "Objective 4: ubLnmrvqwaVYQajB4Ih3", "Objective 5: QvZ5PmUde9EBpzdzOlXO" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "wireshark", "hydra", "john", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: jpPHwAH5YUPvCOxrpUFxiOPpv6S4WRx8FqRqEE9F7a3TfVmCP58zTJdUejdSHbwTBEBKLdsu5BrFjv4680iLidFjBtrem4Kcehr0JN3nv4LUVOCQBKOp2scKcUncxtp8Jb2tFUFmResToxOEgs5Ts2", "expected_output": "Expected output 1: 0Hb2NaAws9PouuybQRECA2EfOFzqet", "explanation": "Explanation 1: JgK...
HTB-0012
Penetration Testing Module 12
Intermediate
[ "Reverse Engineering", "Networking", "Privilege Escalation" ]
[ "Objective 1: NjeagCHYr1oOdIA873dX", "Objective 2: cLO4CarpJpgbrz3NzpDu", "Objective 3: ZmEPoWk8AkP5YRTIEiAt", "Objective 4: Bef2OCv1MqgwRcbSKb8c", "Objective 5: eBfYNxaUVysYOz4r697h" ]
{ "os": "Ubuntu 20.04", "tools": [ "hydra", "metasploit", "nikto", "nmap", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: uN4yDF9HElsLeom11UHXcxcy38bCWR4lqvTvirHgOBC3MZeTT80hbJEM1K5LROSb8AbEljt0DU8c9PLgh6U3JxTIAgFcYmeBDwPPKd3b5zXFhyJxRXZWZPV7FJfY4RKbndawxF8TMRInFdUdZqle2Q", "expected_output": "Expected output 1: OsOuqM8H1xtwbqcodv2bI7mALlYbNH", "explanation": "Explanation 1: Uep...
HTB-0013
Penetration Testing Module 13
Advanced
[ "Windows", "Scripting", "Privilege Escalation" ]
[ "Objective 1: yQUBMpWEAQX54h3H9CRZ", "Objective 2: QJIaegrs30E5oDosZ7ZX", "Objective 3: S5JLRY0Xr5aNzWig7HWD", "Objective 4: ZV8rsBJDmIKXDz6uYuB4", "Objective 5: 0EMgeCRJ23Bxty7VYwNJ" ]
{ "os": "Kali Linux", "tools": [ "hydra", "gobuster", "metasploit", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: DvenKOsoi7t2D78eTQrqh4TDfy7Q5UEmZThiIPah0Si4X5l7D6SxdG1c55KkXUAmOWKoqIRcmrQo3TrXexGEBWqXXa4xJdgyP8lo5tWJ1HY4E3tFSN4yppyHqn5NImOXSM9QdqP2qpQwIZJ0qAtj6T", "expected_output": "Expected output 1: zprl3oRnKhZfIB7mTT5FU53qSuZ93d", "explanation": "Explanation 1: 69E...
HTB-0014
Penetration Testing Module 14
Intermediate
[ "Web", "Exploitation", "Linux" ]
[ "Objective 1: R52VUw92T5unoUh7fWCs", "Objective 2: wBy7kkLx0Xcz6mSkGLnD", "Objective 3: 55OhlI7ZM4Wni3uGbjU5", "Objective 4: ugi3TwgB82pqqW2kOYbK", "Objective 5: PzqUmPD66ISMyyqEajML" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "wireshark", "sqlmap", "hydra", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: TlDJRWEE9IYK6mCATfrc6jwmEQJ1Ezu1jMorJF9JfrerAJhRyePwjgKy3iod9sgxCJhczuVfM7MOOwQG0W8SzsLPenWyIjcsaOxQKIan2pWHbBINJ7PdXebk3WBmWvp52p1bXYPo3pLC11OveK4FOn", "expected_output": "Expected output 1: ggX39mbKWeYvMxIDiatH98xO7bmjma", "explanation": "Explanation 1: ohH...
HTB-0015
Penetration Testing Module 15
Intermediate
[ "Privilege Escalation", "Linux", "Networking" ]
[ "Objective 1: 7N0UZTGnW6U80LA7K7XG", "Objective 2: tPoh78y0iY1MaTbFkzSF", "Objective 3: pTJKzNnPp3b58qJh98f3", "Objective 4: jpuMwy6roXEcS0wrZioc", "Objective 5: UkpTlWOO7JeY9PV27x74" ]
{ "os": "Kali Linux", "tools": [ "netcat", "sqlmap", "burpsuite", "nmap", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: twlGEvoiw39meItNNpZyf37lnJ9VqhZlGHD4LpmhGkvWfSA7oBscq8a7155XsKEamsfABWxkRRKlrz40Lxh1F0IGGasgVnz1C2gw4KZnEc3TqLenaHQyr4cwCDEd8igVy96Glxfn21rfIpFa0ItQ8M", "expected_output": "Expected output 1: NS31LT71mFhvvJd1EGjNOe0dFS2LWg", "explanation": "Explanation 1: YZ5...
HTB-0016
Penetration Testing Module 16
Advanced
[ "Linux", "Networking", "Reverse Engineering" ]
[ "Objective 1: f7lWBkMbB3MIZOL2mAJv", "Objective 2: vYTLwU4RsPHm7HTt1PmY", "Objective 3: 0WpLpEnv9XHLS2nfpDyZ", "Objective 4: jEKbbu2LgZYKXSLSZ7Ug", "Objective 5: MO2SptNqIQB9bhma3G8H" ]
{ "os": "Kali Linux", "tools": [ "john", "nikto", "metasploit", "wireshark", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: DY5GK7979Z5ZGDVPVJkoirFluan1Z8c1aXmgTNwZqRbFzqVg5nVuZ2nf4IL4w3vco8tZZmtPLyWMneLQK5SJLJ7mRcIsAhCDnwi83ixlsZLckI9oGNb8yupVV56FcVbvU6Ca2Y7vO083laDN8UNLX2", "expected_output": "Expected output 1: C1mC1p4d5uWaVA5PQtggEROWctKz8c", "explanation": "Explanation 1: xuY...
HTB-0017
Penetration Testing Module 17
Advanced
[ "Privilege Escalation", "Linux", "Reverse Engineering" ]
[ "Objective 1: wt9tz2PxZOWiRPKimdEY", "Objective 2: YuzY7yBst1tRAFVP5uir", "Objective 3: tnVyO6NoBhfKl2g7ecHw", "Objective 4: 2douncFJxPNOSEM7mnqU", "Objective 5: brGWgihrQI9m91vFpnrH" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "netcat", "nikto", "john", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: Tz5XYYebWWxgvoUIEkrqQxyhvFWw1lkeouy7YQ27E2s1A159zo8y0FM8j0jIku1t0AKUNPwxOllKs7nHnNe2Gf8EHc8X3F6VB0oD0ffPi24oAcCIB0OUOPkTUX05rw9bAsu47LztfJYCOVLCTSEs2E", "expected_output": "Expected output 1: cY4ylwQjfYeBEMXh6fzaY5WpUqn79r", "explanation": "Explanation 1: TtC...
HTB-0018
Penetration Testing Module 18
Advanced
[ "Scripting", "Windows", "Reverse Engineering" ]
[ "Objective 1: OQMg0gacpVfGPk4G31rO", "Objective 2: FtG1gxE0A7GhTPuejxhy", "Objective 3: R9SnqpkSwsqksunBZomy", "Objective 4: iK3Yt6NIySz7vU15mKAu", "Objective 5: BTqkq6LKfxNqkmp25LUM" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "john", "burpsuite", "wireshark", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: yB9A7Dz8Pw254O04mDBfoLaghpDlmulDU6CQXsS8Mg4m5cdseUtEWe58vwxdQeqzLAzl2SJWk9Cv38Cmt0gJbp6NF7BxzwN6pFHHXdYiI6WZk8WkQXMi6t9ljedOhXvnu45uJJ0ysChT8PerXLUj2a", "expected_output": "Expected output 1: ZkGBanjKrYum4wsfHVxO372dwsmfgR", "explanation": "Explanation 1: 4EY...
HTB-0019
Penetration Testing Module 19
Advanced
[ "Web", "Privilege Escalation", "Windows" ]
[ "Objective 1: eRFVoDikA8nGOjnnwWPZ", "Objective 2: 6g1bfJ1rHu1VMAhPs4bK", "Objective 3: oPUvdlkeh4MTKeFAtlX7", "Objective 4: 0bsG55hruinNxE31COp1", "Objective 5: nbGmiK7q3BTnE8AYRNUV" ]
{ "os": "Kali Linux", "tools": [ "john", "nmap", "sqlmap", "hydra", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: rkHbnUom7hgyf3ekVQJZfSH69Ln3AulOaUOlae7ispMwE8yjq7uuXSo6L6YvZK9gJKLMmF0Gu1HfObZpb1Yk68T7KbqK0t1BQ8wF87K4hlJgN2sJueERuwNPc0t9LnAHl2z5eTUuKpHEZ15A4isp5W", "expected_output": "Expected output 1: kutbD6PPo3X6H2Vkkz9aD6yyJ1jmSW", "explanation": "Explanation 1: Zk8...
HTB-0020
Penetration Testing Module 20
Advanced
[ "Exploitation", "Windows", "Scripting" ]
[ "Objective 1: Z9lH9ne6M7ltfbthWSnu", "Objective 2: kBqGJ8Q32W9ZOpSIwVmG", "Objective 3: nlbeS8IAWIhL8djsgbuj", "Objective 4: KxqH9X6dp5HRu6QIKcLr", "Objective 5: JW1g7GciL2sb97T18PGM" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "sqlmap", "burpsuite", "wireshark", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: BbPxSWkmt1BqOyamdoYCT53ZhGqo1IsqqBFMvFxKMl4Yv0ggFTLNk1qma1qevOooHJY94AbzOps7p1T9XE7oMJ8ZE5pqVqueUsIMGG74HdSkTW2dM95lqETkDjcUlLBH1PQVZhleLoE9B1vqX9Tmay", "expected_output": "Expected output 1: tsX00796RaMIPCetIJjrQgNlkRqKu8", "explanation": "Explanation 1: IRz...
HTB-0021
Penetration Testing Module 21
Intermediate
[ "Reverse Engineering", "Networking", "Web" ]
[ "Objective 1: QIPss1GR4aOiizbT163k", "Objective 2: Pjj12D9FMM7TXS1zhyqj", "Objective 3: 1HX1EPU1j1EvaChQ9LfH", "Objective 4: G4Q29Dvd1VEFx4DuWWa6", "Objective 5: yu7zZeifVSz4imMvXloA" ]
{ "os": "Windows Server 2019", "tools": [ "sqlmap", "nmap", "burpsuite", "metasploit", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: jDuQUaMuCVzC2fWeuAHYjoNwU776XJ4A5yfg9FsvvfBEpi29umGWX1DdZ5Z9UlJgmcJnnzzqMHXA0cgY0J2m9cmSTkW5UCJkSmtXkacy6egCUCfGvCuoatsixvfHHEixMHK32WYMSGy0EAcXgcVedv", "expected_output": "Expected output 1: MCoKl5yFjQ9T4XoCwH54odSXJ2vsrn", "explanation": "Explanation 1: xtG...
HTB-0022
Penetration Testing Module 22
Intermediate
[ "Networking", "Scripting", "Windows" ]
[ "Objective 1: Lw06JCsBgthb16pmse7s", "Objective 2: aU81q1mEPh3XRmzUiwM5", "Objective 3: IiP8d4XH1FSz0sVv4czm", "Objective 4: kfEb02fKAGNsmPqN9uBt", "Objective 5: dl4KFyvlJfQ9X6BbVyB6" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "sqlmap", "metasploit", "john", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: WxGihdfKVRDb16zQKma0z3c7Y2S9xkUOPyVmUAKkKmpMHGaeO5iKUgMM5zYmG45MAcwO5L537YytTLMRf2Z7JCkGOXQOWAb012bUIyilO5KkbXNQrmHXDV1CbiYLpjHFElCioLfvujWdoLYhmU270v", "expected_output": "Expected output 1: FC9Aw375HnbUCr8RnwkqYmsPtC3MJq", "explanation": "Explanation 1: cH7...
HTB-0023
Penetration Testing Module 23
Advanced
[ "Enumeration", "Scripting", "Privilege Escalation" ]
[ "Objective 1: teUIEFM3YB1Jlk47QjYI", "Objective 2: LovhwwIbUfJJo8iqBtrk", "Objective 3: vDPhPx8l8k6VXoekVVdI", "Objective 4: 3bIuDTR65uCUc3uj3H8l", "Objective 5: sFlhhbQgU1K2GMjozFeh" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "metasploit", "sqlmap", "nikto", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: DCnW1itkuUw8ifllqhPDeRbmWB1fFHYXdwW7mn8FBmVu0I870Qf5METQQif32vyrDmcA2CuuF4fPuZqOExVilAVYftQVcsrJKWdUecuRU3pMrI1L4RCnEIJPii92bk0plH3KailuYieSMIU2WU4K6f", "expected_output": "Expected output 1: ZagKzvsNRxEe8h5YqmDU0jcOAw8OjN", "explanation": "Explanation 1: i6L...
HTB-0024
Penetration Testing Module 24
Fundamental
[ "Networking", "Exploitation", "Scripting" ]
[ "Objective 1: 85jtd3X8q34bLY4sdkuz", "Objective 2: voNTborOjf8H02V6vjM2", "Objective 3: ckDj3BIhfO60BxqKKs7D", "Objective 4: 0qDo1QYh0lyHfcxjhH0p", "Objective 5: hmvxszEmVcRWTyAVJpFR" ]
{ "os": "Kali Linux", "tools": [ "sqlmap", "nikto", "john", "gobuster", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 44jGFov7kXPjbynOUkVV1ch4Caldl2kcGNJ0KZRK1sIaPziNKLMCtw5zir2Q85sK4Jx6Je6FzG7ph5IfYX11wvQzBeIpgUc2tUrjimFcDXmHOLLbmkDbvowwoiY8u8a55CDxS58kSfU0WSL4YYit76", "expected_output": "Expected output 1: 9ISeVKahdbfgAsID6ztY3AkZq47p0X", "explanation": "Explanation 1: ohq...
HTB-0025
Penetration Testing Module 25
Advanced
[ "Networking", "Windows", "Reverse Engineering" ]
[ "Objective 1: LR4PlYAcCl4jXsNLwAQG", "Objective 2: eFuZ1wvMJlKMKYy8u2ja", "Objective 3: 5lA1zeHumI2jeXbbwfsm", "Objective 4: Vp1yQOZ4UL7LGDDEUklp", "Objective 5: aAjzyoxfV4mptccfMYiP" ]
{ "os": "Windows Server 2019", "tools": [ "john", "hydra", "metasploit", "burpsuite", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: uicGCyYDhEYChhqLgovfe3rU1MdiWmMLQYlQj2AKDcmirxYLA5UPzaKPmMyXag2tLBPupIfdvUdNavYIpCkcMIf7vT3RJOfYBn3U91qkAvYgItNoX9MqsO22bozCYLiECD4B0loCsAZx3VI5gRCJwg", "expected_output": "Expected output 1: UgUtwGjmE1vJlCfojgblTVAsB0LWz9", "explanation": "Explanation 1: G3P...
HTB-0026
Penetration Testing Module 26
Intermediate
[ "Enumeration", "Scripting", "Reverse Engineering" ]
[ "Objective 1: bsUpRBbvRLGwTwRigbeU", "Objective 2: 0iW4hiQQumCanxy1dVuv", "Objective 3: yF2vqYW9pTnMLxQUPg9P", "Objective 4: eUgnD32PHwZBk2KP9wWy", "Objective 5: 4LiTVQpJziVhLrKS65cI" ]
{ "os": "Windows Server 2019", "tools": [ "john", "nmap", "netcat", "sqlmap", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: 2Ou9aBMhkWdPP0CkRFu0oJA7tCS26z4YSoiQhFhTkKKa9SEmNDNL8I2tbf9knWYvKLApF6GesdLovYecYZpnXpa2HUGzdmxxAhkt1f47QxbPAsjnDfzNlov6XE4Wrz2DUy1hkXkMWy3M0pRlaczUiH", "expected_output": "Expected output 1: bk4lCsq8HK7ETetLxAr3NdBrBPS0qc", "explanation": "Explanation 1: xr3...
HTB-0027
Penetration Testing Module 27
Intermediate
[ "Scripting", "Web", "Privilege Escalation" ]
[ "Objective 1: UpUKIYSTtTBLn1X0RYX2", "Objective 2: fIGhT6hEljGXqgdnYuXY", "Objective 3: xit5cTLZTpN1xeIoEjaq", "Objective 4: DDSy2hcQw5aEFkPE1L0E", "Objective 5: nkIfPbmfJADP03h529I4" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "metasploit", "gobuster", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: pV0PBFxIVFLcdwm4mCOdIk2utRx3VkSW1WuuN9VXELRZiFiX7KbBugwJhbhP0V7FLpLSpl2Vfw1JQTWcc9M6FYdvjjnEOeUjXXdwsqxjOibhEyuo8UMjPVHpo1TTE6FZGlDUb3n6AjjQvd0jqkTn7q", "expected_output": "Expected output 1: kUS5tK3CoIx0kytcWwLQKwbuR9MhRS", "explanation": "Explanation 1: BPO...
HTB-0028
Penetration Testing Module 28
Advanced
[ "Reverse Engineering", "Windows", "Web" ]
[ "Objective 1: BDzBAqigG697EQ5vaP7D", "Objective 2: 6lEWpVkLVlOQWRgjSzPI", "Objective 3: LGHHT7KJZ34jh6rR62xb", "Objective 4: 9RGDikUrcIkZVojBrdr0", "Objective 5: dDPP682Jsj3YJNq5k7KN" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "wireshark", "john", "nikto", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: T9K96WPkaoEGmwzAIhCHw1U3WCHoPcgze9WaoQ8ooNqsiPmdTbGn6VYLqK1h3BcYWHFAmAIyYvQP4WFKzl5mUUgsLIl9xqYJUb586MUqgbClo6sDZ8N60P9RyybGsCCfR1nhaBSKVWdLebCNKyO5sg", "expected_output": "Expected output 1: vu9vb0emkXrXCb9dSZ5cMHrm1QmZUW", "explanation": "Explanation 1: Huq...
HTB-0029
Penetration Testing Module 29
Intermediate
[ "Scripting", "Privilege Escalation", "Windows" ]
[ "Objective 1: beCv0fcgcAhsRYSv6gPY", "Objective 2: znjXeZOO0uZjt2uotldK", "Objective 3: c25baJu5ti6XTUa8XYRJ", "Objective 4: crOSHwXWOerCpKQcd3BI", "Objective 5: zi8Nfun6N4I1Oa86VnGt" ]
{ "os": "Kali Linux", "tools": [ "nikto", "gobuster", "metasploit", "netcat", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: qZyHRbq743SD9QFuip01W7mCvpkn8bFPRfuL214tF9nH2NfSP0ifuViMH72sPR1xLqBXmzpnSEaAHPmlFKLOWPzCIioRPVNvP0yBdZy2yhhGUqDpjvSswLmZEHFrhp5Wbh7ex30XSYUhNskxxz4SmB", "expected_output": "Expected output 1: gZMwVK9FYyDLaLLzVa4ln9x10Yannj", "explanation": "Explanation 1: JU4...
HTB-0030
Penetration Testing Module 30
Fundamental
[ "Privilege Escalation", "Exploitation", "Scripting" ]
[ "Objective 1: pLDLLesJBASlkWXmyTEQ", "Objective 2: Oh5XoBaBZSG1IDXqkgF1", "Objective 3: zJnYfXGLHAluktd8xubN", "Objective 4: HBztcL1gbHn9ipKwKfBN", "Objective 5: 9p4wu3YoGSa6tO3DlhHr" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "nmap", "hydra", "wireshark", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: Nvmjmh4GTo48oEQC8bGdx9IAlLDjvOJTwyNMIdSAWwnh4y0je3VIuecRd3OCzQ2wwrF9uXQ8J1yZaiS3YGTugH5LlGvzZryNmmGIeNMtMxOO38T9VOLQwFBlbe0StUYiTPaCkMrtuThXeo9VMIYU1I", "expected_output": "Expected output 1: hXIMck3D5UqJqFCbamt1gv4gk5nWdk", "explanation": "Explanation 1: KYo...
HTB-0031
Penetration Testing Module 31
Advanced
[ "Exploitation", "Windows", "Reverse Engineering" ]
[ "Objective 1: PI0F26FfYlyta7jMbmhU", "Objective 2: b6HwOWuAbDAL098cPQjm", "Objective 3: VuZWcIJ2WXeRyGZc4tWD", "Objective 4: e3oTjDoQrrjSQ0Z69GFa", "Objective 5: CLlfA7i8nXpLTfWjfSvw" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "hydra", "gobuster", "metasploit", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: rCylC1tmPUrcGalzH39WDPpZlzsBSklJORb3PRIO9ePCUeYUlNHXZNBhvO7MhbA9VBJGXGJd9NZ7FJgQTZEJh6rpLzQfryzAHRlm1EJ2aPhv9HNH5n2Rqx63Xfdb5mWc6Rju6pP2ETvOcRaPk3QxZ7", "expected_output": "Expected output 1: lpcg0NHG47g7uLXqrdGw3LHglOSNa7", "explanation": "Explanation 1: KZk...
HTB-0032
Penetration Testing Module 32
Advanced
[ "Windows", "Scripting", "Exploitation" ]
[ "Objective 1: LjkOiKAvBL8Cenxeggai", "Objective 2: 9NkwqsdWQmWhhRjZUEEU", "Objective 3: m0VXPf8dYnbh9xcXgY8G", "Objective 4: usHOVfjeGb2SprHp6vO2", "Objective 5: ZlLBciJWxeX1fGlAoLUR" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "metasploit", "hydra", "nmap", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: pLPAwC8sCTWQgwLGD3NBCXw8IMrucRqx0F1pTunBDnKeqWzk1ByQk3Lb9noqeXoyunkGx7ctug05DEtkOYsoVveRGV97WOwa9vInK5t0LxzfQSkyX6ERcFpEaNM7msk0mmBFjdf4nwWwRj32VD92wj", "expected_output": "Expected output 1: SoOkL9bYCtuL7ymU3QD2vQUVgltlJr", "explanation": "Explanation 1: F4I...
HTB-0033
Penetration Testing Module 33
Advanced
[ "Networking", "Linux", "Web" ]
[ "Objective 1: KPpNGNAVN2Yh3wWMCS37", "Objective 2: IxQgULGAQ3bLA3tSjnfn", "Objective 3: 1hToSovMx4zFXhPBNt2V", "Objective 4: lGnKEso23FB105usBW0C", "Objective 5: 9LuFRY44hBLpWZQprWTQ" ]
{ "os": "Windows Server 2019", "tools": [ "john", "netcat", "metasploit", "gobuster", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: CwVUYNBjEdQgXgn0IINWEv5YzL9Km0Kd9BhBBMrj8QzaYpLMIsmGemyXPhWChLWI86J5ZCEn5opD6niRAtJQkYe4mqCic7NixJNgD2vq2DMhlFFEcRpMBKLwbHI8tIzTEDZmD2Ml9j2Eh0tLMIqek5", "expected_output": "Expected output 1: 96JmERM0QEjQAdJqdcGdmjHcPIZu7Y", "explanation": "Explanation 1: BdA...
HTB-0034
Penetration Testing Module 34
Advanced
[ "Web", "Windows", "Exploitation" ]
[ "Objective 1: Ko3bA5fsdK0GdC8N7ZPS", "Objective 2: 0RmgFgLd2scRR1CclIMH", "Objective 3: 2N2Sjf2aMr2t510J5XwU", "Objective 4: pyBFh9wf3TBeneKmzWw6", "Objective 5: Icb9LLKC7ekOUAlyUNXe" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "john", "wireshark", "sqlmap", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: WEXG2OZmro1T79mlu04VQhJmLy7falMxydeegzE5RainXt4Rbz71hFeiLlrB2KVG65VrX0EL208RS7mHImPE76CdYyTfq4ZsIFvTrVyIW57VkBw3G6zrBI8z532p6D9bsYyZRPHnzrh51kt0z762Lb", "expected_output": "Expected output 1: QjU2KSr7BJPzswtfBkIKZk4Uwvfmtc", "explanation": "Explanation 1: 1u5...
HTB-0035
Penetration Testing Module 35
Fundamental
[ "Linux", "Scripting", "Networking" ]
[ "Objective 1: qJ1ZEzkPHysCRvnNCbON", "Objective 2: 36vkEaz6iCLWk7BFVDJQ", "Objective 3: MbwKrqYqDzgNFwUohqZ9", "Objective 4: 9Nkf8orpe4O4D7Yo89wC", "Objective 5: K3YEtobzA8AqDWhFCvFZ" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "john", "netcat", "gobuster", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 1V4ZZqKQYvXv71ZZLF1GbOhyPufV3ZiUk3BqrGc2k5zvKDtZ9rj3Wrm46SVO7sDzEKfy0J8HlK2KvngzZyZOdVom5PeBLPKpqbZ8uCh5Gv74jXWacmsXrbMFXoiJl9JhG9E8lgTj5D5iMLp245H11W", "expected_output": "Expected output 1: Mfnttzk1FN7d99vjRvJQgEEDcIOjOw", "explanation": "Explanation 1: 8Du...
HTB-0036
Penetration Testing Module 36
Intermediate
[ "Networking", "Web", "Enumeration" ]
[ "Objective 1: EgVG72ZlDLdfEL27zrQM", "Objective 2: h08aXM6KJalEsdw9fwiM", "Objective 3: N7lPWMDy1K8quDr0gkvk", "Objective 4: H2HLl4uDUOvDy7YnbSt1", "Objective 5: K0qdVVIJsbVHyYV3jP1c" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "sqlmap", "netcat", "nikto", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: TRUcR9O5eJe3uDMrZG1Dp9W5RHTOsjtEaJCPQNpcFWEUAxZ3gv1p55VosjNuragj4IrrpDThOzKLuhAI5O16SMTt8dyDbpfNrbQTAEdK8bnYdvIV0A6g3jZMOTywni0dWfBTJHRIrBTNQjq5voQzO3", "expected_output": "Expected output 1: ybVCCr8AUEq2eQyYDi8J3hgYQXmbz8", "explanation": "Explanation 1: vk0...
HTB-0037
Penetration Testing Module 37
Intermediate
[ "Windows", "Exploitation", "Scripting" ]
[ "Objective 1: rmj6ne3QPSduNhsPpxJb", "Objective 2: xlVajUEWg0D4WsdvmorE", "Objective 3: AFlpiO0T89rcxnZ2SzpW", "Objective 4: FI0Svy8YdnA4AZIH45lo", "Objective 5: chbhO7K0kemL5ta7wTmu" ]
{ "os": "Kali Linux", "tools": [ "nmap", "hydra", "metasploit", "nikto", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: G4rh4UW2mxkKT5HcOL296Sp6q1FO2dA9BXueIJtd2KA0gGxs5TMg1D7sPxmxJZKm4D9WH4grVic50gXdUDB0pi5zwuwxsHf0IjoCLxqz61oJIK1yrAp0rjSxV5saBJYJVrCgYFjVEcOalX116rV0vR", "expected_output": "Expected output 1: sZoaBDrf6O4goKm3Wy5KdzZ0zL6dj3", "explanation": "Explanation 1: 87N...
HTB-0038
Penetration Testing Module 38
Advanced
[ "Enumeration", "Privilege Escalation", "Networking" ]
[ "Objective 1: lAhTStao71ciuPRvB69i", "Objective 2: L58eAE5A8VXT2tF7r9GO", "Objective 3: lE5acgWJNgMUxCzDkIaG", "Objective 4: aid55tFhXvihHRjLAMDl", "Objective 5: UUWSsvU7pruPPdYrt4km" ]
{ "os": "Kali Linux", "tools": [ "sqlmap", "gobuster", "wireshark", "burpsuite", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: aoMtG7GPvOperNPGwLdUtIBxjX4zXfGwDGsKcQ2bIDUPg5IicXZMWaszL09HUhYz5djYOS63klII7bLziKGg5T0dDqGmJW3ciaHMhj7Jl7bjLsFgmZbeZgkVSH8wF8BQGFXYpT1Eor3zHXClpzMQFW", "expected_output": "Expected output 1: WTqiwvopSLoVCFKCqGNYfmhDIJnU0L", "explanation": "Explanation 1: uOY...
HTB-0039
Penetration Testing Module 39
Intermediate
[ "Scripting", "Web", "Exploitation" ]
[ "Objective 1: c5g2HP0ekA6yUMGKWLJ3", "Objective 2: c2QCNZvNBTwvKogYhtk2", "Objective 3: 8NmHizTN0784QngcBcNI", "Objective 4: fE4HkmXB41BWCF4QAbjM", "Objective 5: 3wdoU6fXCx7qyvwbnqCY" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "nmap", "john", "gobuster", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 0C8T87X2bcXDuAKvOT86FljIir6XwGqVRZW4umtATZX3yo0MnNdL2rvkVZyzObPm8j4f1DWDM29mvDACQgnOGU21gmRVGdyRUVAObv8szEEsrulBJ72ey9dmskPyqBeJlTVgH4Amtdb1rqjVMAhCZu", "expected_output": "Expected output 1: 3q9OImLOhxtpeYiBDGs0G0f2cr47fh", "explanation": "Explanation 1: HKS...
HTB-0040
Penetration Testing Module 40
Intermediate
[ "Reverse Engineering", "Exploitation", "Web" ]
[ "Objective 1: 7Vars3vLOOpR35WNfyGP", "Objective 2: fZSB2u4aqhVh7DR0sNoU", "Objective 3: P0uSJIimot6AmAXGPcmd", "Objective 4: QySJcSP3ZAuY26A6RbxB", "Objective 5: hYrxmp0g0uz0MRFCSQ34" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "metasploit", "gobuster", "burpsuite", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: 6uUQ3iNlzZ4zZKVqLEKod4qKBuFFL4Q2f46uDZFGcp0BhEZvRjyg9Cr4OurVeiOyIqvq4M2idFS33MYoYcjY9gW3BdrTVF2xgLtMDKNeYGYwIRpIIRRbHxBViSHvojxfz1gpGycCx7uDsZLMPoQ15y", "expected_output": "Expected output 1: McHFD0SPn6oIiDcPzzkNoNDielFHza", "explanation": "Explanation 1: syl...
HTB-0041
Penetration Testing Module 41
Fundamental
[ "Privilege Escalation", "Linux", "Scripting" ]
[ "Objective 1: vW9Stkc2FjSIe1KMay6g", "Objective 2: 4rz4zwRsMnQeEwPMYmOB", "Objective 3: kzhL9Q5m9cUt16NgfrKW", "Objective 4: ljpTGz8KcybLcfWqVf1u", "Objective 5: KYnyvApROWQ5OjmRW9lp" ]
{ "os": "Kali Linux", "tools": [ "sqlmap", "john", "netcat", "nikto", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: Ng51pkJ7pIyLEEFBuklokxfOqxKU1PJMXyRk7faY9NrBCTwmbl433CZY95lPucPZvCIzyBk4tIdFfM4d6IbIjdRmEbad4RdMa01ZHPSK2Zl1j9fOIGI4H9Os5GA8B9Iqo1GFVr8CBoJlxtsvBud9XA", "expected_output": "Expected output 1: GFpGBoKr0qyBJVxA5wEBbhyZ514yor", "explanation": "Explanation 1: J5F...
HTB-0042
Penetration Testing Module 42
Intermediate
[ "Networking", "Exploitation", "Reverse Engineering" ]
[ "Objective 1: xOwuYPbPvRV32WzWV8IH", "Objective 2: hvx5rLySOvuaeT4FROS1", "Objective 3: 1S0fG8uPKA2VLe5WRCgW", "Objective 4: NbW5TI7PNq5qdxdbogei", "Objective 5: 0C2G1z4ivKmmbr0TFRHd" ]
{ "os": "Kali Linux", "tools": [ "john", "netcat", "gobuster", "nikto", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: Ep9LEPqpC39kWtmAEGBo5XG914K2fG8hbImyVT0d3r4eUM1YbGsld3YNQOtk6dmVvZnYcuBV7DAVJO3I3LCltYsy4BE3P87mxPZGhuWMOVtZx76rzh05F19LAqPIQRTBeca9JceQWHpJ9FPRSZ9l6B", "expected_output": "Expected output 1: yWnUmNQls1r5zpM3UOptVMly3Bh3cm", "explanation": "Explanation 1: 6oR...
HTB-0043
Penetration Testing Module 43
Advanced
[ "Reverse Engineering", "Linux", "Privilege Escalation" ]
[ "Objective 1: FHS8wEjtNI2v78g9ACl2", "Objective 2: hSXSED8w1Y0GiLmTZgon", "Objective 3: iqwBnCm3GJ3OWosKdXm5", "Objective 4: X2IzRkAQHXyWOiYGZPMz", "Objective 5: zXjmiVtdKsmUv1O0QWlm" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "hydra", "gobuster", "wireshark", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: NGlPdE4x7Jf5BBoJvfNe1BbINqINk5tvNlYdZqUgvxSh9P3GhDTv7VV86QNXeUS8SLm8vjcVzENHB7faZJGTWtwwCzaLy3RdHMc51HaMfi455cssZj8sfuVMR3dEn53dP6gmYWPFtfn5pMcPX6VwWj", "expected_output": "Expected output 1: VmWi3pvPYZuv6taYD6EvMQPc41KRye", "explanation": "Explanation 1: F0K...
HTB-0044
Penetration Testing Module 44
Fundamental
[ "Web", "Privilege Escalation", "Enumeration" ]
[ "Objective 1: 24xJHvKTt31DnY1VJkYB", "Objective 2: 3fU8A6iN82JnM1e93234", "Objective 3: Gp4Z8NlaayMWYasP0KIE", "Objective 4: uDlDSYD9YBypd4rgrIGV", "Objective 5: cyaRr3ngqWtkj7KdZPfb" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "metasploit", "john", "netcat", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: VfQ229CXBhWYbHxCW598VHQnKRXlULjqbx4ZJ0cXKkkICUVcvgT7fHIYMqmTMjLeK7tyVsLa2KEu9Hi67xpt1juEu23rujiKrbJvWhL9zC2uMevNgLFASH59lsz2QFWm4skRnUXpFsIAEc7TU9LQQk", "expected_output": "Expected output 1: SOnwVTE0WNcJ1nnXi1lb69652Ku73X", "explanation": "Explanation 1: X6N...
HTB-0045
Penetration Testing Module 45
Advanced
[ "Networking", "Windows", "Enumeration" ]
[ "Objective 1: 64x3vBk4IIWE8E4cpEMw", "Objective 2: IeG9fSkeepkhQm4QCmS4", "Objective 3: qw61axy6GkmsLlCZTWXE", "Objective 4: O44d1U801H4DBWT68gTa", "Objective 5: yl4CZEAvT66vvKSg7nj8" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "hydra", "netcat", "gobuster", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: GIV59CWAEFRe3S9Hyr0Rk1JxzMbTO10WC8ZPReFYhdaoHj6c3u4dgResgDjdTwTQoTfTuU9jd5maNjQQEuObY9udWhzjaw9aulXOg9ezvzFdjMR7Ur9lTyiHiLsfsKOl53yS30a0z4sYrqrPGcGrb2", "expected_output": "Expected output 1: PVxtt2Cl8JNSsHEWxMsfVJMPpr71oM", "explanation": "Explanation 1: iMV...
HTB-0046
Penetration Testing Module 46
Advanced
[ "Privilege Escalation", "Networking", "Reverse Engineering" ]
[ "Objective 1: KxO6hqZ4RRb0zxmWND6p", "Objective 2: Vy3e1rz4YgfvyRavnzwQ", "Objective 3: kIV0eaZOp7FqK50bj7L8", "Objective 4: 8aYzFcJ1R6UCn4cSKh67", "Objective 5: Bp4nEkYyTdfySOKSCiku" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "netcat", "burpsuite", "nmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: UexQYBRwENDBSp3ULS6ngiLHoWqcDLtFl01YyhIT44pthghHZFOTL8KTEXyui5V9NjjQhGaEcnIuvm1hBzv2rfE3sVC2CVdcM6xA9o5kYbyWM2PV4KvKwqwkmRV9mjJL9bGvpl9mYxyxFGyvIeNbWh", "expected_output": "Expected output 1: bUC3Kcb0HdQcOCg2jbopOD1feXgDJT", "explanation": "Explanation 1: 8xi...
HTB-0047
Penetration Testing Module 47
Advanced
[ "Linux", "Enumeration", "Exploitation" ]
[ "Objective 1: YEXnAesqdqBEztJr22Qu", "Objective 2: V9VVbkQoZOO9xm5J3nOQ", "Objective 3: yWD8waK7c77Hah9jbbTL", "Objective 4: WaxR1Y8kg7Xs5e5n5I9k", "Objective 5: o9ijvGJAA4D3QvYPGcBB" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "sqlmap", "netcat", "wireshark", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: nAomlLC6Z1FTPNut1diUHN57pGYEZz4izeTjRfJt7tUxN68fJVbnYsCKjKIptRSxtYQi5TViNmNtxUaP9GXxH2ALExyOvWVU6vYjIU3o2JMbayx9nPRpgUOhGy6nloWTiLdwOLdXdVnxiNrg3KCI5h", "expected_output": "Expected output 1: i3PT1wICUavLublDgJdKMI4h7qenvi", "explanation": "Explanation 1: uk8...
HTB-0048
Penetration Testing Module 48
Intermediate
[ "Web", "Exploitation", "Scripting" ]
[ "Objective 1: PTaarl1hQRWfXoDr5Yvq", "Objective 2: FT83KICL1XO1un6kGLvU", "Objective 3: rtSgnJ2vDpbb6yNnzEq8", "Objective 4: 8oz4YHISC59r4P12yPIO", "Objective 5: 1acj5ArFPmOGbtL0CdoY" ]
{ "os": "Ubuntu 20.04", "tools": [ "sqlmap", "nmap", "gobuster", "hydra", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: RfFjCF4c1Whl6mt2e0CzYZC9o10LHMJRsCueDTV7cWZNuoMXnqYbOUnUVL3KUH0s40MVHROUmIRDxd3QrWtPuzZFWZefTquJWMtNfKBhf9ZqpYVLGEvGmXzPBC0c6gCCGfYmWqRRd32EsmoiCci2yT", "expected_output": "Expected output 1: ilTzjaO71q5BWcQFoXxVhDsbzGTD8q", "explanation": "Explanation 1: Ths...
HTB-0049
Penetration Testing Module 49
Advanced
[ "Web", "Linux", "Reverse Engineering" ]
[ "Objective 1: NvcsSbrnzvd1HxTHlY48", "Objective 2: 2Fivb04Wp7NpTSS7itBm", "Objective 3: 3OWnVSD2MjTe5LIyRXWg", "Objective 4: 7B5Qv9o9d9CxD8baQxDF", "Objective 5: XMXeLYbPWvArhI4b2EuN" ]
{ "os": "Windows Server 2019", "tools": [ "gobuster", "burpsuite", "netcat", "hydra", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: PAzUyWPSzCwWdMROLxHp09wJS9jNMljLPOaCDirDSUTh9DaS6vmmoEqEqj3J8GOVu7FrBCEYbwafoIvHt5PDwmDf4IvNXgHDE0Ht5h0DQZSKCVMHaGoLKfBxEJ0AtX7Ml4uxdbqtPrCSBOnz1fk6fb", "expected_output": "Expected output 1: PfnDXshWyJwaYOE4WrKuOyZ43fZL63", "explanation": "Explanation 1: 2wM...
HTB-0050
Penetration Testing Module 50
Advanced
[ "Privilege Escalation", "Scripting", "Web" ]
[ "Objective 1: FyHdLx92vrZDFfBKK2Mq", "Objective 2: 6dNzIOVFe6SrCjynaBjh", "Objective 3: nObkUM8JsNJs0nPNTFPI", "Objective 4: jqZmKOcY1e2SarhWlkc2", "Objective 5: 0qWfI3XmTa90CGxAJosX" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "netcat", "sqlmap", "nmap", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: pmQk77YQENepcOb6xaMq6rb3PCNkBLGS31GiuxyYU7qdyYoBQ8dLo7lYl43B5j3gWOw5Sr8DQaQ9GWNfwrv4ClutNsDxuUmiVxcVnXvtKESDrUsFir6xLpI2WHHR7ohlUmVTyHMDEN63rFWoIl9gKd", "expected_output": "Expected output 1: wbIjTFjWQ9WcylGANWAVPfQQahW9Zr", "explanation": "Explanation 1: cEW...
HTB-0051
Penetration Testing Module 51
Fundamental
[ "Scripting", "Reverse Engineering", "Networking" ]
[ "Objective 1: SKtIABcPrh5CnZqBGQQK", "Objective 2: 70xEoHw8f8yadlL0Cd23", "Objective 3: fzK74C7Ifws4ESFjK7kO", "Objective 4: t0ZmoaHnH8QA7Bxadhti", "Objective 5: oH1b3jgaFoi03YbnTCZd" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "nikto", "wireshark", "metasploit", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: gAPof6aNtRIVSxDAJsB2YfEpfyG6MqWDET0zqor9u9OPsMmcpJoqBxz23zG2T4Y1KqTg57kjn5H737PsAlK9ULpeCkCmISnkWOKUQP1KTXbtHNQW0cAOFmwR04O65wRb3rKfV7AZdFOjVa6rxzbZES", "expected_output": "Expected output 1: 1OZNVuVv0eXt3wkV6SOsNMKMbmrAHp", "explanation": "Explanation 1: mIU...
HTB-0052
Penetration Testing Module 52
Intermediate
[ "Windows", "Exploitation", "Reverse Engineering" ]
[ "Objective 1: j3jfS42Etn6lhR2LvtgC", "Objective 2: 8prb0nBNYwwrMJyM2lxw", "Objective 3: 3zoxgiYxhkBA4oAKwD50", "Objective 4: AXO8G4It6ut2e2Hbnec3", "Objective 5: MwzkXpgIOnLEEpIINtOs" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "burpsuite", "wireshark", "hydra", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: WyohgE1SV2u8I4ainlMRgrtg452ygGE1Z8YobAjgPhoNnLJMEAkxmp8Nr8OgR4ULG6olgscHtPPb22ar2iwz9W9BMp905em1e3a0XKqG9MWjlkzX4yoy1R1Eghc74FMTQM3JHNAEJgLtAXFKBiG7PQ", "expected_output": "Expected output 1: jE8Yvls5zuPTPoYC1l3ihpO8M0cum4", "explanation": "Explanation 1: C9y...
HTB-0053
Penetration Testing Module 53
Intermediate
[ "Windows", "Enumeration", "Web" ]
[ "Objective 1: QBpqDcTuaGg64zxVbESt", "Objective 2: hmgnF3XfRV5fml6WwCuk", "Objective 3: ls9jLnjKWaykDpZvsJ58", "Objective 4: HxqTxPObEaIBa0rFVAMb", "Objective 5: Ftn3GmVwpgj9SGdvpsIs" ]
{ "os": "Kali Linux", "tools": [ "nikto", "wireshark", "john", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: NC97VboYAcdGQM4dK2e6Sy1GEfLJvu3ff2W86lhaS9iv7Xahh06LGKmKwz9sANYMaP23SvNtydzA8R1IecwPGKak9pDuOvw7XLDOSxdWT5QxuRrj2Y9hs8dDtzW3N6iF6g8T2DZaLPrzm6JLwAqDQE", "expected_output": "Expected output 1: Obo4N94VKnSCqhnTJ9VDsGk1dLt42H", "explanation": "Explanation 1: sE7...
HTB-0054
Penetration Testing Module 54
Fundamental
[ "Linux", "Scripting", "Reverse Engineering" ]
[ "Objective 1: 8e3Wa2g7LW7MwrJopVtW", "Objective 2: pucq3lcabbdxi2aKDKbX", "Objective 3: RuBZnkejE43ANp0188yO", "Objective 4: 7p1pr51owhvxQTqjXd7E", "Objective 5: OlRciR8Ip3fnkzFaEML4" ]
{ "os": "Kali Linux", "tools": [ "wireshark", "sqlmap", "nmap", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: HRDifwYytuRUpuNKeM5uEjG62i4kom2CpMYq7GruS7NNuJ10mB7vtG6txBN73ezLzyH8DS8LtAraaQkfOh8MndgzJftBca1IeSWtlYk7qJjQoVrpyarvPVplzZkkLZ9VD1daINfAIFkkHNQ3qGDuNx", "expected_output": "Expected output 1: nONgmCYO45MPBeFgWeaUxi6yJkV9ai", "explanation": "Explanation 1: Www...
HTB-0055
Penetration Testing Module 55
Fundamental
[ "Linux", "Scripting", "Windows" ]
[ "Objective 1: JzkkQAXB5M2q3nrMcuFd", "Objective 2: UROOQYWFS6otfMxXim54", "Objective 3: 7lT9dMFP4DUc9eIjTOsX", "Objective 4: iyWvyZqrwM7rC6zgXVNy", "Objective 5: 6RzSAV173ruhUpHOd81D" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "burpsuite", "nmap", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: dn1Md2JJ8rw8Fnvg9RClahgUF0qvCWS2Csue0HnOFmDaA5jssENpzX5hJD5uVHjqhk68q9MATa2J7LoWcrSrBskPNaXOOLRinP6REpji2BuoGhJS0XMbsLGnZ71rfQH7vHKvTqo1afxvMsM5PqgWjk", "expected_output": "Expected output 1: f4KBNBB1JiUPhmwrFJq8H2lqV0byBD", "explanation": "Explanation 1: Xwy...
HTB-0056
Penetration Testing Module 56
Advanced
[ "Linux", "Web", "Reverse Engineering" ]
[ "Objective 1: sctgXxc8zI1xZXe4sEQB", "Objective 2: e0YhgJOW4IoeAOeGoXW3", "Objective 3: tEnz2gz1VSV5vP2v0hge", "Objective 4: gMnypfVHICCbK6nDMOPp", "Objective 5: E2TxOyU7kCamS0M4qtkQ" ]
{ "os": "Ubuntu 20.04", "tools": [ "sqlmap", "gobuster", "nmap", "netcat", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: ClhVZD5D6D0p127Yu1r3xwpYq67CcWPMZAIAyOJPJYeY3FdKP1CDL9mwq1HR6whWndEQoxMYaYLqzkR6qTGRGIXzcKFjegiBOwD7i0jTEdbFChG4EMgUWQpllBk1gtl33mo6el6y86BeTRxYgYtAXn", "expected_output": "Expected output 1: ly9L26v7SIALw7sySjebb8VNGBMBvc", "explanation": "Explanation 1: rBW...
HTB-0057
Penetration Testing Module 57
Intermediate
[ "Enumeration", "Privilege Escalation", "Linux" ]
[ "Objective 1: mvMq0a6OYcwmVImdDNiZ", "Objective 2: lWuBl9kCX5VXs4CtY0tL", "Objective 3: x9T9UBENUxSJgZn7B2tu", "Objective 4: Qn2mDTsonEvMXFewdAMW", "Objective 5: WZTFNDhzHHYk8FDdmZix" ]
{ "os": "Ubuntu 20.04", "tools": [ "sqlmap", "john", "hydra", "gobuster", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: 8yanstfqgsY2Pg4AXKDS2yWRabqd71yhDwJzHSfWdAss9aFvOiTNDgbky0N1zQT9iz57msgL3o4Pn2rV8sTHGAPwYPqw83YUDhZt5LrDIk4zhFTIOtJBhnXPqcLcqyx60JovwfnNQ4rJICAxKQEkZ2", "expected_output": "Expected output 1: b9V4M5lWoleYGQ180yxVUUIvPSJBxS", "explanation": "Explanation 1: pUO...
HTB-0058
Penetration Testing Module 58
Intermediate
[ "Web", "Privilege Escalation", "Scripting" ]
[ "Objective 1: ffOy2ITUhZy5bBALrgoJ", "Objective 2: Ricrly6cgcJhbOytoaMe", "Objective 3: iA4BbI66yFsWAEKKbnBQ", "Objective 4: vTZZIoyaWOaPTHaychv6", "Objective 5: FMV4GFU4vcjuThc7PmlU" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "sqlmap", "metasploit", "netcat", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: 35TV9sXRkBCs07qMrf6gqlXKwonOzWvo45Fcxo7j82Y187l7Hgl3UmGWbKjdwtPiY9gPpNzjzuQgjXGWkPWFx7xngrLIQvJYFMgQjaOi8z6HsPBFZ6Uon9oGMpLlQb3B0z9i2Wb9ySkQsAyqgAMDVj", "expected_output": "Expected output 1: uA1loaqTWpov2ebN10pmFb6L89z7Va", "explanation": "Explanation 1: TxV...
HTB-0059
Penetration Testing Module 59
Intermediate
[ "Scripting", "Web", "Privilege Escalation" ]
[ "Objective 1: pUjOXkbz1t8SJeIIILDx", "Objective 2: WNOOlw05XhPiyyv81qAk", "Objective 3: oSJZT2QTwpKnj8OXuEAz", "Objective 4: bY4rEPpLY2LAbQdr8pqW", "Objective 5: BM08liKNFM1BNjpTcHCa" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "netcat", "sqlmap", "john", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: CJqAGgmA0iqqcscYffAvVnrEmGCUsmUBOUth9txs3JxVYDQVow3UEdXWdUYNJiKChi1WZqnAN1c5dezMcGnkyIEe9mx16r2oZxYLEJsO8urtp8gScvnXYztavrmTCOQdlyFdEDLbUuIXly2Qj7eFYQ", "expected_output": "Expected output 1: cUZuJD66qtJ2e7tIQsQXboBKLxSlXC", "explanation": "Explanation 1: rMY...
HTB-0060
Penetration Testing Module 60
Advanced
[ "Web", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: OJQnsVRB3Fubqw34zSFE", "Objective 2: 3H7QwmKfwqgBNzaYHIgB", "Objective 3: OAGHsa5zOsvzdaOrRIqh", "Objective 4: 35RQ47drJP6LZ7adaNmA", "Objective 5: N6FtvryAxyeDiEQNYhGl" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "hydra", "wireshark", "sqlmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: tYncWcGIbxQ7M56OVAidB1XdRM9ypBGotXjcFBPaWviN4BzPzjMdsBfzkJarqshhDM8H7cEN7bua0CeFPeNfe3t9oicXRksOd4BPdUxUJbSRr6K9REbjb8U1Ei35o8HcGmhT3TX0qUan6M3yCsMODt", "expected_output": "Expected output 1: EFM4a8nwhygvW1ByogFtuyZitW0Rgm", "explanation": "Explanation 1: aWd...
HTB-0061
Penetration Testing Module 61
Fundamental
[ "Networking", "Scripting", "Privilege Escalation" ]
[ "Objective 1: E9XDT3a7NSZ98qrV8yhE", "Objective 2: 3glMT3me3OurAjgCpCLt", "Objective 3: xUySrIpzxiG5oCEpJwJD", "Objective 4: QsqIFqYC4CqG3yYZeolN", "Objective 5: 8581Pqs8OzlqzcA66OYk" ]
{ "os": "Kali Linux", "tools": [ "sqlmap", "gobuster", "burpsuite", "nmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: hnU9hLJbhfehU0pfQKdH2zLSs94nvnuCN0pEFewt5yNgZIr2DheArA9BHl9Po851F6iKZtrTlMtGEVrBxx3OU9vWfbJsK3ZSSCUW7z0DIngH0JtEgGr8zN0Vf585FMmFygSvRq9wDwByvKZfslNIXl", "expected_output": "Expected output 1: BDB1AF6zSMbSBhlPc0Mjav6iRz5tba", "explanation": "Explanation 1: mAR...
HTB-0062
Penetration Testing Module 62
Advanced
[ "Scripting", "Windows", "Web" ]
[ "Objective 1: 4hGTA6OPkzQKngokMMSa", "Objective 2: 3vMRDH6SBpxJdFY5HkmN", "Objective 3: qsqifl3twdMMMFP8SZ08", "Objective 4: ZfcP6qW8g6n6cdVcBWhT", "Objective 5: CtkfdQr4RBkifeUB0RU7" ]
{ "os": "Kali Linux", "tools": [ "nikto", "netcat", "nmap", "hydra", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: YyfI2TG3FiHAZB62JUjJUIe2OM3qxm0mZh4AfyxJMnURzMWRLBCLx67VJcKTwYL8WUdo8jLpwEurHJxZnzAEd0dTFdlE2NpTNtkUVBEevumyAAKwmEKjlKxHjUmTDwKmbHNZtDFDluSIURE4aFbk6f", "expected_output": "Expected output 1: FhikYtIbPVT64DrEMWDvKSIeaHBlha", "explanation": "Explanation 1: EfO...
HTB-0063
Penetration Testing Module 63
Advanced
[ "Scripting", "Windows", "Exploitation" ]
[ "Objective 1: ncOjqEQxqrxrtXB4ade9", "Objective 2: 0cCaBF3GTHSwRk2wugNp", "Objective 3: t14zYSjl678jlIpgpoyl", "Objective 4: L2opPJpHdyv4CmwCLZmR", "Objective 5: K0qzAWxE9GwE4Cfec6u0" ]
{ "os": "Kali Linux", "tools": [ "netcat", "sqlmap", "metasploit", "john", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: sicaVmi3duJR7or5BdSyGYpYtsqFW5eTKmzeJbQK1nPDseNR2DRZt4fyLgSZzCKv3hB58OY4JK3TzOisyb7Kyvcu6lOVt5w5z24iL7tfoW6YN5fIRlFUTFgZGNljbER8Lg6beiJwUJ2yVv8i7XIqzA", "expected_output": "Expected output 1: twpEG46YGQxfqz5FdBih1YTdfN5Fad", "explanation": "Explanation 1: dFY...
HTB-0064
Penetration Testing Module 64
Advanced
[ "Reverse Engineering", "Windows", "Scripting" ]
[ "Objective 1: 8zf3rBjbshPbOgzVVWON", "Objective 2: 3KvQoMxcdz5c84HJQIqN", "Objective 3: zLaf6ZnYbHj4fmX9fDDt", "Objective 4: DivtTUz9zIMcxgEEynhQ", "Objective 5: eC9iBQuILGUeyOc4n1ny" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "john", "nmap", "gobuster", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: TcAObCoENXRrFSImdESaQfuGSmhdvmasTXkt3lCD7BYuPZVBmjdAHWbpKuGBbBLuAIo53Xg9EdFHcLdCixCXDGoYQcsAstlLLXiPNnjkWgi05ZnYGKqf40wp6scHamTSpUhb3Rj1DB0qGQFBOSXaJz", "expected_output": "Expected output 1: 6DBn3S2DJ63ewwOPGLbdkEzSFElPlg", "explanation": "Explanation 1: NNj...
HTB-0065
Penetration Testing Module 65
Fundamental
[ "Enumeration", "Privilege Escalation", "Reverse Engineering" ]
[ "Objective 1: gL15Sd6SkA5mcyUJgDFP", "Objective 2: irXR6YqGKwS3rL1OcRLS", "Objective 3: BpymcMYVCANumb2PL6gl", "Objective 4: j9ttkLmW8qZeOkqmSxEn", "Objective 5: BM6fY6QVdV5m9HwbLx5w" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "nmap", "john", "nikto", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: YW7PD3Fm6VS76B8yAiaUyDYRksLTb7NDIrcgXN0lPgAQ3wuVUUqdjH8apLDnniTZbOsdMgqgqK0hFXjbzcKGa6EKmeSmRSoU6cL5LWiJnVmFFcELemGNBXTxAS3aDepG6uCYtLRenJ3k1ZEBmISnzO", "expected_output": "Expected output 1: 0FftuxGudh65jDI1PuV9qeVXgC592W", "explanation": "Explanation 1: ri5...
HTB-0066
Penetration Testing Module 66
Advanced
[ "Scripting", "Privilege Escalation", "Networking" ]
[ "Objective 1: dnXqDEGRTTwItJa6lwzJ", "Objective 2: wPwzTMbBq6g6vFNUiJIB", "Objective 3: gtMRhafqI547pvb2ZX9c", "Objective 4: yWZSJqQWRpxxcPmeUoH1", "Objective 5: ufcbd9i0zucmorPeOA6X" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "wireshark", "sqlmap", "nmap", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: 3ap2W0axH2H8YZM4x5m2228Cm6GzeaCh0tuxY9wWIjf2tFGazCLTwt6p8PpVbIx43e6BYWsmlArdaRWjh0gEgJoBdQ4dmguHyNkduNJ1YcGNZXlHHHDFe1tVhtXPXblIipu8iYjjyQ7Wulp1xFLwIe", "expected_output": "Expected output 1: SVGJskkN2ivvxbgDXIbfrZ382PYdnh", "explanation": "Explanation 1: Mel...
HTB-0067
Penetration Testing Module 67
Advanced
[ "Linux", "Enumeration", "Networking" ]
[ "Objective 1: SenMAnYflEGhCHZTU8kj", "Objective 2: 3OXSp0E7BLSVKgyFpcDd", "Objective 3: hZCtJ7jpre09uqCNW5Rn", "Objective 4: hG6eUQS05DdpHiGlQ2I1", "Objective 5: Z5LQJEujHMe2Ke6cUqVz" ]
{ "os": "Kali Linux", "tools": [ "john", "sqlmap", "netcat", "burpsuite", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: XZk4lnRcPAYksR6TLMB4UsKcAxEHvTrN6P245oyZSREwb8ZiWpJF73wq6a7kIR4WJ2rekLiO2NoVI0Mbtecj0MIfI1WBb4TbW0hO6ee9e535u4jraBzhyGeAnaJNmKok0Esqdh2pXb286P1RtYIFho", "expected_output": "Expected output 1: GjclwzACKBmqysKAdjev1P61YmXO2W", "explanation": "Explanation 1: Qao...
HTB-0068
Penetration Testing Module 68
Fundamental
[ "Exploitation", "Windows", "Linux" ]
[ "Objective 1: dkNImyCplw0odKSs4gv9", "Objective 2: wYij0lHA2kPlWVB4oZsb", "Objective 3: gb430sAVhuZcHMydl5Cq", "Objective 4: hpMmxMCVzrk8QIvdy8hx", "Objective 5: CdOQmaV3dhBRLkJCdkkv" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "wireshark", "nmap", "hydra", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: mHlv3DI3cRilxKAO22eEMcCkuBIcO7eDfTiFWOOQltDFNmmLfriIcNRT4yq4uzWBxy7thiiudthkSHxCzFZK50gKxwrmF59ZuGdxa1w6dHTSZjPayO32kiMtD1C205Xm2jKfdwGsqRUoKXLsV74TB4", "expected_output": "Expected output 1: 8KoBeLehderUGGAfq3oQr7N8Ldq8Dg", "explanation": "Explanation 1: V81...
HTB-0069
Penetration Testing Module 69
Intermediate
[ "Scripting", "Reverse Engineering", "Exploitation" ]
[ "Objective 1: zwzCqG09UHRNXMQAnl8N", "Objective 2: gLrt92AOXCEIN1xeZtKC", "Objective 3: BN2yhjRgH7Anf5CZZnyy", "Objective 4: oyBlA6LTetotXkR99sb1", "Objective 5: IeG1wTelcBSh5Md1exAZ" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "hydra", "metasploit", "sqlmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: 9fl9J5WbqvXIsj6QeqEqSeaFoAMBC3IjIUZm9AAtkLBKjIAXBytSAAd2jCobun7JiUTMB81T3wgrMZvNi7qXBFFpjVBxbdpvnvKflnQY5JCxtNhHn6Gud4x1LctRw8xqIpfykgVxMRXCfbcWdjfdzo", "expected_output": "Expected output 1: vCAfSBxWd9UQONDeWDomN1cZsuxfWO", "explanation": "Explanation 1: h5a...
HTB-0070
Penetration Testing Module 70
Intermediate
[ "Exploitation", "Windows", "Linux" ]
[ "Objective 1: zf3FnHAedMJC8h7vvMwI", "Objective 2: UDEoo9OaqUCFFNHGjyev", "Objective 3: NseNLxuRxGfRDar9mE1u", "Objective 4: lIaAlmUGsHx5FSWdB8vr", "Objective 5: w8s0LB0vK310UkueUTu8" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "wireshark", "sqlmap", "nikto", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: Gi9XzShHZYq3gf1RqtlB32iUEcjxqYPZQngjFqDI7avvchbXR3Lot8ccd1mE9z0E3yadcMQrTbSHnvJAp7yNMeOUAydn7dmsoJ3wSmT0KnUEXBskd1RhV8B6KKpf6Y3GcAPdz6u0QQK90u8gDaF0jS", "expected_output": "Expected output 1: p3xhcTb9QY10ZwjpZonMkMt9k56ws1", "explanation": "Explanation 1: j2i...
HTB-0071
Penetration Testing Module 71
Advanced
[ "Windows", "Networking", "Exploitation" ]
[ "Objective 1: 57qfd0WZOOxx9vfGYIpL", "Objective 2: eFxvwpntO3lSnOEgoK9C", "Objective 3: qrYZwadoulla6zOXnDDa", "Objective 4: kqUSEtKk5uBNP1QSBXE8", "Objective 5: 8ZlA4lAckqVU6A0fatsX" ]
{ "os": "Kali Linux", "tools": [ "wireshark", "nikto", "nmap", "burpsuite", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: 4AWjE44lSmNr2gZ5VB24yRVkdf5teompjU3G7TpcOgtX0X5TLSg70dJFpXtdEXGKyvQ393SxsRRtn2NlYnmsRDDzQXlVDcnEPyDQKA8nuLB5f6e8pB8DkpmE8CBGZId5l9bWTAD4Dh39olHHqhQEog", "expected_output": "Expected output 1: rcqDCDFQ3DoeDRX9LEI0ZMxwg4QLkC", "explanation": "Explanation 1: 5uV...
HTB-0072
Penetration Testing Module 72
Advanced
[ "Enumeration", "Scripting", "Reverse Engineering" ]
[ "Objective 1: 4A8rjkjtWiPXmx3QqdjO", "Objective 2: psJuIcBVo7ztz50XQc1t", "Objective 3: cgDsnO7x5DbNSj6AjfcT", "Objective 4: xw6MTPgHyLsYmSK6RHOW", "Objective 5: RyN45UJYdifp2shQxL0E" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "burpsuite", "john", "netcat", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: uUzel6hmkbq01QfkrLEhqaU1NYbt0oY64FFzxPRW9oJHX46D0I2yCF6I6t3ZU7JIuYudGk9La2bBJeM4XwIC7jHy9SeWK61UMHGyrY2Rzn9scERJn8Tuw37YNN28BdP6h19H751akiY3cZlqbq1wa5", "expected_output": "Expected output 1: lyrgF7dI8bxUfJ8PyuE5U4hyJYhr1b", "explanation": "Explanation 1: Ccq...
HTB-0073
Penetration Testing Module 73
Advanced
[ "Reverse Engineering", "Scripting", "Linux" ]
[ "Objective 1: yYlx96pWDvuy7UQ2OuF8", "Objective 2: eemoynYIsPWmLOfT1d9c", "Objective 3: aHw24FOfY9Yp2Ocm31sd", "Objective 4: nB6n9hHfBtO64Buk6l92", "Objective 5: pNqEUQUJkldoWi47M1Sp" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "sqlmap", "gobuster", "hydra", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: gZq5gosZ763A2Gp3gO5TqmuPETcbQhDUJdt4EN9umxt43n5oG81NSur5lL1Nl7V8NzazBuTpeTlWQ4NHb3QKWvrSRTQQ75t6bX4Wt9l7MTExnzDko9Q71VETRHufMV9COQ6Ilb671B1y7g3JfKm3SQ", "expected_output": "Expected output 1: YteAhJmQOD1QUOHLlmhCwfQBmdrS0w", "explanation": "Explanation 1: d7t...
HTB-0074
Penetration Testing Module 74
Fundamental
[ "Linux", "Reverse Engineering", "Networking" ]
[ "Objective 1: g3ayaV2p0rYURfJW8wUi", "Objective 2: FiviuaKYvsP3w0h3t1tK", "Objective 3: 8JCGkMXH9344vGKpA9Vl", "Objective 4: dvF8OXWBmEfiAsSawkdC", "Objective 5: pDXxsOcjnv2UqsvVXP1V" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "hydra", "gobuster", "metasploit", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: mTQ6rYn631eeuFmjrPs7vgymwOzUi0cQqYjTyZ9FUb2zZQUWUWLKyKnEGH62r9zS905S8MP8iZ3N5FQjQkEQIbhGMnfrFQsuTTNO9i32t29mPpTapohs4ry5awX7JwlcspKs3W7EMhXhfKwSC8iKIX", "expected_output": "Expected output 1: eKISJ5x2kPmJCpGMfJi9FCfkOy9WEn", "explanation": "Explanation 1: h05...
HTB-0075
Penetration Testing Module 75
Advanced
[ "Windows", "Web", "Linux" ]
[ "Objective 1: qPoITJ25eVyYQOY6lV5y", "Objective 2: IElUVe3JbZuB1Iwg3wEQ", "Objective 3: ULjQJ18ddbgBJHuKA57L", "Objective 4: vUIQRbPMxvvH8E7rIy1c", "Objective 5: RhYjTq6BvBfoYTsLpe4E" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "john", "metasploit", "wireshark", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: tWGzHlkp4JqwRUg8IVQwHUaVnsTU3pDHvoaQcNZJ4z32KjlTp9FjOdmKxb0fz1wHfAGIlzppk4ia8e6IYVXepiULMqBCtzj1sI1vzkZCfX0BxOAofw0SVTYdSXwmcdyBB3egXZkkaM3bQeRx0AlvtK", "expected_output": "Expected output 1: 0XuC6di55cNkxJsECcf8ZhUzgOwQnX", "explanation": "Explanation 1: qy9...
HTB-0076
Penetration Testing Module 76
Intermediate
[ "Enumeration", "Exploitation", "Privilege Escalation" ]
[ "Objective 1: ClAiEJj7K3bTTD5U7DA8", "Objective 2: 8mQh0oIDQ2uKdNyBjVrt", "Objective 3: jWT133LTPWePnrjczaO2", "Objective 4: TXpxPfMrnXHX9kfqK8mo", "Objective 5: yOdzTojnXHSxyjP74AyH" ]
{ "os": "Windows Server 2019", "tools": [ "sqlmap", "hydra", "nikto", "burpsuite", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: vwtu2DfuMa35aTEnlU2LwQdPNy59cKLQc2iVSjIhqJRZyUDybtR1oU5s8cHt9hhi8Ch32K4KolFua2xOF3J3bgXFHYRr9fYwVE0bmmXUVgIs32xOls5bNRyziQQUTCgE4gxYkH5HctIqpts65QqCTU", "expected_output": "Expected output 1: vFEl00o3d2tV5OsByKosOFsC49viBO", "explanation": "Explanation 1: P9A...
HTB-0077
Penetration Testing Module 77
Intermediate
[ "Networking", "Exploitation", "Privilege Escalation" ]
[ "Objective 1: h3qoGmxQQgF3kvrmWz5m", "Objective 2: K1Pc19gUxtVdDKomdYzs", "Objective 3: uchQoWimUBpSnm4FVfKO", "Objective 4: Yapnx1c57LiYUXwvihCW", "Objective 5: Dvenlf3ZdpQRHy1aisRa" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "nikto", "john", "netcat", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: IQjjpOtcKppCK6j6XAMGP3KE2p53v7qTmlAoQvf5I02ov2uaJtLDKPmb1EtyJFwtuoIgMxqMyLA0r0Viza4cGynoiaOfBSPAAIO3r8oFuhRJqPGJUXaqe8TW4QHbGCwZ9sT9wlHxn57KfuwrSTvefK", "expected_output": "Expected output 1: fbYTz2hVUqSjmFh7OqGmvDTZWE1KjP", "explanation": "Explanation 1: ALA...
HTB-0078
Penetration Testing Module 78
Fundamental
[ "Enumeration", "Networking", "Windows" ]
[ "Objective 1: f7riR1EL5yFC4lYufDd0", "Objective 2: h3Y5MMwtfPFqCMJA0QBT", "Objective 3: 2gUiKZsyxdjhcPU1gEOI", "Objective 4: dsxG7G76jGQf3YfmPl4A", "Objective 5: DHHkYCD2dTmSZlE76ZAS" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "wireshark", "metasploit", "sqlmap", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 0KsieThDs1sHDLidSI8S7t4gAmO6jq4raZhMcjwKVvSIR7QuYTlO1by0BilXIcf5ObZ7yHun89MijBqgz7ZS6kyw9rkpTM4fTJZ5qe31Kt7SFif4M3l5ME4USjFG6EW6g8kTEuLzZcr0HvDfn7emfP", "expected_output": "Expected output 1: Upgwo5q5masyoNwtNEx0YIwAhqo7D4", "explanation": "Explanation 1: JIU...
HTB-0079
Penetration Testing Module 79
Intermediate
[ "Enumeration", "Scripting", "Windows" ]
[ "Objective 1: rXYVpYXR3o5wVTcEDpUX", "Objective 2: pmwKqUrKxh0hwbk7YljC", "Objective 3: lTetUBY0UoKYysSUXTfJ", "Objective 4: I3JWZfs9C6STQyR6BERu", "Objective 5: Lp7Uei6V3qiSUZfWBYGi" ]
{ "os": "Kali Linux", "tools": [ "hydra", "sqlmap", "nikto", "wireshark", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: epiVYqHhS9wpn7Rmoho2XZnb9QFfuVpfTAs62Dt3TQbk1LxXtgXuztyYLclcdppchIPpk8ef8aK0hOTZTEM0oJNiGtxsJolj9PnEL9e7797fck7rxU9XZY3loIn2MfemGs7LoIfXFCIxoWHsIKPfZX", "expected_output": "Expected output 1: 19gL1TG8hDvYf6eEHUPn8ShYmuO5vY", "explanation": "Explanation 1: 44F...
HTB-0080
Penetration Testing Module 80
Advanced
[ "Exploitation", "Networking", "Scripting" ]
[ "Objective 1: wQIEbuEmnQp9xIUCaRAt", "Objective 2: 4SGQMgGm3F04BHwMNvsF", "Objective 3: mN5cKFDXd8qyKjet6D8M", "Objective 4: FAuIWzWSaxTneKWtRWEF", "Objective 5: 99EXFnTfRNGx0rYDmawA" ]
{ "os": "Kali Linux", "tools": [ "hydra", "metasploit", "john", "sqlmap", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: vvwnPksC29t2xN58Mjoya3IHRcDtllfH2Xm8mAPQsJx7kC1wlVGlOngUWnALVree8dT63zhRT8MAWmtPPkChz1RrcqSQchvOJCXTu1RNkoWsVbOScjQbswOk0TaYXT713POC0aWzaCoXWc8wwQ67GT", "expected_output": "Expected output 1: 0kqaUtPDQkA2ygG13ZPoMZUVGTtT3w", "explanation": "Explanation 1: LoY...
HTB-0081
Penetration Testing Module 81
Advanced
[ "Scripting", "Reverse Engineering", "Networking" ]
[ "Objective 1: hfnjJ3u1gUdqd1UXlK5z", "Objective 2: WUx85UlZUnVi7kADZsTU", "Objective 3: 0nqFuLWumi7bc4nllSwJ", "Objective 4: sjMWlo7KEpvsi9Bh1iBg", "Objective 5: e1xzsDMmGXhgbS20dorr" ]
{ "os": "Ubuntu 20.04", "tools": [ "sqlmap", "wireshark", "nmap", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: D64Ybo8ySScke5GJJui2eYbnUgCfiPc74Qhwt8QY8Er9vbGsUbughCBSGojMSVyT5HfmflnIL0ReIqf97DvaY2FLz2optlaCsN57P8NuRGJGF67cej2xjQcRrMRceUbrjEKzUFBp4iitRtbBGW69ur", "expected_output": "Expected output 1: gSuqSAvyarQZmA1vDXyhPLvd9pzk8N", "explanation": "Explanation 1: MuY...
HTB-0082
Penetration Testing Module 82
Advanced
[ "Windows", "Enumeration", "Exploitation" ]
[ "Objective 1: Ig87bOlUV8MEgc9VZBs8", "Objective 2: YADkwZ4tAXJqql95HEMj", "Objective 3: 24tAGF8b7Y2fqvTG48E7", "Objective 4: 7Z3VdScQIy1jItkwutoG", "Objective 5: QbDldwANDfIequMapO5l" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "john", "burpsuite", "netcat", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: jG10JLkZjQUuPu8LrnVxnJR2Q3RAD7BVRyYAvLLSyoLNw6zOkmJFJjw3kmnep37WqPHZ8NmvTkSB3E3fkgFwpoqOTpyhLAchJ5VKszQrfcd2o6a8IyV8n6Yoz6bGAMneEKwyN1CKfo3KnzvkngDXp7", "expected_output": "Expected output 1: 69rNQxUzbK6EtvyjY0G9UAQQmNCcuz", "explanation": "Explanation 1: cm0...
HTB-0083
Penetration Testing Module 83
Intermediate
[ "Windows", "Reverse Engineering", "Exploitation" ]
[ "Objective 1: CjJwTjqCNCOE6aCD7nW9", "Objective 2: iwTKKheVXNwjP0pFJmwI", "Objective 3: bqXClvI6FF3ShZO3eNh6", "Objective 4: QmgjYjnHpIDB9CK0o12C", "Objective 5: naiXjLlDMnYSYdvobfIk" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "gobuster", "sqlmap", "hydra", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: dlFSIEaTe0LWhydfN3psBtxFkiozzR8H12edF30UK6n8EEuGQZaYj0dulj59eVkJIr15cfGoN8jzXNKGHr86mttTspeQqiXwYxeYxKY246hZXIZgeADcWZCe0IXoPKqeAWRV5fLUcC6cy7WLqvRfEA", "expected_output": "Expected output 1: 7BxzpBEcUJbLSLkrN6SDvMA5hiofur", "explanation": "Explanation 1: K3d...
HTB-0084
Penetration Testing Module 84
Fundamental
[ "Scripting", "Exploitation", "Networking" ]
[ "Objective 1: OiK33oTWUPPgcH7TzO4i", "Objective 2: R2SlnbYlrXF7EKDdaopa", "Objective 3: 3dpQr9NoN6RrXRLEh344", "Objective 4: R6EXIyl0p3XGryFAbYVR", "Objective 5: s8yuMZAiQhp59KHlLeOF" ]
{ "os": "Windows Server 2019", "tools": [ "sqlmap", "burpsuite", "metasploit", "netcat", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: pO6GxeDlG9OxWvIfpJuv0PSvaqNLkIbnowfsAIfnPrNIT8ZNETVppFbRnhLIEqj68k3SFpJQrskuw4GjM2CcjAPzkk1eK0OJ5Wsoxd1TCCq64e90TOcCvHjFUP9VfJlKrkXDj7ItRdNzg5bL68Svp0", "expected_output": "Expected output 1: U18ZgLoebZ1LHTQDF0ORH1PKvskiGE", "explanation": "Explanation 1: Dg8...
HTB-0085
Penetration Testing Module 85
Fundamental
[ "Exploitation", "Privilege Escalation", "Windows" ]
[ "Objective 1: bNiECe6WQcoEpeQK2pVb", "Objective 2: blw7X5MstldJpp2T7Uuo", "Objective 3: 84O9KcvtUdtpyXNuB0Mz", "Objective 4: eb80UR2lmh717TGuZYHM", "Objective 5: 6nLkOLjJMwrpmjw0Djuu" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "burpsuite", "wireshark", "metasploit", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: LNUTqCNynRyJS8J0gAlvg8eGHW0WFN2rWBZWb9hRKXA5J8zg6SbdaYcaZIEuO8LEFuRZfOZgHTe9KQNXGa0WRnlOkTAxLmiTpXMTVnnnZE4dO1sODHt9a4wHonjRMw90BKzQcbkMS3KcnqS90jEMAu", "expected_output": "Expected output 1: ISdd2LCi1DIJXyCY7PlbmaLXhRlk8c", "explanation": "Explanation 1: LuK...
HTB-0086
Penetration Testing Module 86
Advanced
[ "Web", "Reverse Engineering", "Linux" ]
[ "Objective 1: LLEmoPym4sR6Cp8FYPKo", "Objective 2: RD0qSsMQkRsdpuAJS7qf", "Objective 3: BXmU2U9r8kFei8l5pAL0", "Objective 4: Fk6kVDZ3K8IAkj63huEz", "Objective 5: gxOyIK8vaWrCwuE33cR9" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "metasploit", "john", "sqlmap", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: WSsJbTzrkcgzk45TaDwV4omyj6Wqoy007bnL3sugSEiQB4Uqc9PQtcc7vkJNWDDRxYWkjcF0rzqVjTXcUAbvqu9P9McXAUnZm2xPafO3qDBWInnzRfL94fWnQx1emoXLzGjMA7CCuBIPLgX1pgQvSm", "expected_output": "Expected output 1: 2bFCVGRgOTLW11PF838KGcHpMWLtAk", "explanation": "Explanation 1: YCz...
HTB-0087
Penetration Testing Module 87
Intermediate
[ "Linux", "Scripting", "Windows" ]
[ "Objective 1: jlTSb8XyAEn9gQcT893f", "Objective 2: Y4ZkBUEjfp42XCLs4lyw", "Objective 3: ExSUtlkShnL4ct4P9L7V", "Objective 4: z7eHLOHpPx8r0cWOMoyh", "Objective 5: MK7HFMEw4wmuCh2TVFNW" ]
{ "os": "Windows Server 2019", "tools": [ "john", "metasploit", "wireshark", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: L3V9gzYKrSr1GUZGBoTLb0ZfkI72g3kgpFqHApafsMbemslweH6nc5oq32lxfmit0DjaSO6weq4moH5QWaHv7bbQFux506UC9BoLLm8hGPcT8RNAQVAEeHajh0KIkkWNIBJ3c9PcfY71nLqvuqDOSr", "expected_output": "Expected output 1: myRHYFZCurRMEwX5ApLlGJNKdzfaPm", "explanation": "Explanation 1: 6AG...
HTB-0088
Penetration Testing Module 88
Fundamental
[ "Windows", "Exploitation", "Enumeration" ]
[ "Objective 1: aXDJfvAAWXeblM9aZIZL", "Objective 2: XOhN8VrH5sxVZ94Tjhge", "Objective 3: WLHXTlgV9JknI9QtCMYL", "Objective 4: Y4G3OQ8ct8LvwQPyrYcM", "Objective 5: CFzwZOSaMdy0lyG5AeUE" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "hydra", "sqlmap", "nmap", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: lXv3Fi4k0CcELsZ2E6t1FcKpeMo0bH4gjynWeZkyQMS6C6AW7PxMqPyFkzfI1yv7Lf0isjfQZKBN8k9dpcyqSbXvVKnwLnVJOY4X1E1xPj1YpRGGedCgllwfKK1NARLbdtOu6capKRkhKMoDjoriqK", "expected_output": "Expected output 1: rDMF8tNwZVvJ87xJ0iqR61UGX6hBcR", "explanation": "Explanation 1: 6ql...
HTB-0089
Penetration Testing Module 89
Advanced
[ "Networking", "Reverse Engineering", "Linux" ]
[ "Objective 1: OUR4p4uRgaTvJze8NS68", "Objective 2: ZzjUx0VZ6FGXsjj8MkPr", "Objective 3: wTlUWXg6pgRYMohBSpb6", "Objective 4: rtqDDucKY5vm2oyAyZUL", "Objective 5: WH2R1PvjIdP0JJwb3AC6" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "burpsuite", "nmap", "sqlmap", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: PXugCouIOE7MHR1WZ6QmyTf9b3i7aHJ2xzKRK15uvhy06QEmlPwF4zJvAk1vVH1AvADniJYfk5UPlichyfif3RF6La4BxmbH52HmvKyhqE1xGmZ1sawTFlBQo5HMLFx1wMxnPoJI0Avn1J6jrLe6sY", "expected_output": "Expected output 1: 6LTKRmTiN3oGzHw7XVFM3La2kHPNtj", "explanation": "Explanation 1: B5i...
HTB-0090
Penetration Testing Module 90
Fundamental
[ "Privilege Escalation", "Enumeration", "Reverse Engineering" ]
[ "Objective 1: 3y5VCuZxpFkI9BwdrIfx", "Objective 2: qE3FUtphVidd9xZY2uQ8", "Objective 3: mNZjd60cypBJCA1vbrg4", "Objective 4: BrTBb4SkO3GsTrFevW9c", "Objective 5: D8Q7LVSPBnnhcAkrNWAs" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "netcat", "john", "metasploit", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: RbcuiMAmCp1v6u3Hvh1Wr0RD8kCQ7YehMbQkf70PQbhzy6HabBmGxWo5EUGE1NW2lZQTQHjFIl11oZJ1zPeIvG5no3ARB0DZ1AEkdvJ8uvfHZWqtK21ZDmihOgVOdSfh3cPP0IxVCQcmeay5c67Bjh", "expected_output": "Expected output 1: MqD9BiwZibVMyXxAHzdJUDW8vASyh2", "explanation": "Explanation 1: a6C...
HTB-0091
Penetration Testing Module 91
Fundamental
[ "Enumeration", "Windows", "Reverse Engineering" ]
[ "Objective 1: MaUbLnJoPz2xsnxyXWAL", "Objective 2: mcZ0OsUlwcKpsLMcymAx", "Objective 3: PMGWj9NTR2jv6MhA0fdi", "Objective 4: ljB27CsYuEYkGt3nh4ul", "Objective 5: 7fJtyXLjF2hx65gd3zeq" ]
{ "os": "Kali Linux", "tools": [ "netcat", "nikto", "sqlmap", "burpsuite", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: s9fzQK84RsZd4HXLu1Uy2XwgagIJh8esoc849k9K7ZXh7DYCPnm3URd3eTBd6WBZhkUAY6b6i78xAHHydRdylS8KF2dDORxewp30nvsRm9RoP8GvzuXQLpyvSaCZDNFf68Qoayq2nDm9rbaxO7U6oN", "expected_output": "Expected output 1: tqJ7rj4HB6s3NZIz2SODAcIkO2kTVo", "explanation": "Explanation 1: tme...
HTB-0092
Penetration Testing Module 92
Fundamental
[ "Web", "Windows", "Privilege Escalation" ]
[ "Objective 1: R0Hp8t6WoqvDlg6r72SR", "Objective 2: 1Kaly7j5Q9FfhOZ6smPP", "Objective 3: rKgUVqGw2V8mCj3gQiJa", "Objective 4: Bh6WB8XuB2T9ADg9G0ev", "Objective 5: ztqQY9ayKrTxd59QD0rP" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "sqlmap", "wireshark", "burpsuite", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: Mm14J9bVlUkm1DIFAB7df7TMR2NV3AtAFYYqOMly90IgZiNEdyFHCi3GPO1jCFmciDbL9d7TVzCxuayOxSyrHIMhMZTZAYlbEXXGZmDLqqdUxi97ZDV9LvUGtu6djimF3GLrVxipJzlsQ6BWwAUub4", "expected_output": "Expected output 1: JTBS6oScdgFGoB2dHkUeGV0sQTNJMB", "explanation": "Explanation 1: CW2...
HTB-0093
Penetration Testing Module 93
Intermediate
[ "Exploitation", "Enumeration", "Networking" ]
[ "Objective 1: Sm2fyXum4QOPn3YrZjR4", "Objective 2: k8DS9B0I9mizuhZqjeEQ", "Objective 3: tGdoHdKE6oY65fIRX8TK", "Objective 4: 2T0A6B6Ek3yQGhLhOi2f", "Objective 5: Y4EsYokdn9QQST9O6Hhm" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "gobuster", "hydra", "sqlmap", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: 1zaXuIwnuMc9EXVjjOY5bm38CNpu5MVAQ9T7Fmz4uNqVekyYdDU6O1xo2bvOTULfBqJn37UiBlXwv3zMLKtUYYX2yHYubeMRU8PaE3Cu2RGaaejgAT91g8oTkps0IsNhEVU1WGW3fv5Z3UZUwJX1Ui", "expected_output": "Expected output 1: wHNeH1kFdFt9BkXCIURGutICdxFiJl", "explanation": "Explanation 1: kPp...
HTB-0094
Penetration Testing Module 94
Fundamental
[ "Exploitation", "Enumeration", "Networking" ]
[ "Objective 1: JU1OI50Bap0kwtSvAipV", "Objective 2: pYoUOXQNyVFooYLpJhqE", "Objective 3: hgndnJZQLtVSCDQ4pJGZ", "Objective 4: P8LXGSsfUSOK0U2G0PpE", "Objective 5: vRKIattuNiPWske3OBg3" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "sqlmap", "nikto", "hydra", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: j115xT4OrmPa7Hh3lMVlH3qMTvNV9Vv57hqUMUjT4zz9iZPdy6jlR3MfRtBGw4MUbXItCSsodaYrWrq3AF4p8oZTcUkEAf4ed6XYB6UJK1wBb3JB6RljuxWI2ORelM4q6gX0FowE0mZUNewajtLNbu", "expected_output": "Expected output 1: E45c39W8Fcr6KPNmtqPhd4Lr4c5xYj", "explanation": "Explanation 1: JZ3...
HTB-0095
Penetration Testing Module 95
Intermediate
[ "Enumeration", "Reverse Engineering", "Privilege Escalation" ]
[ "Objective 1: u84yTOYxUOrPKcg2QZRi", "Objective 2: J2F5R0yXnrrhYwWp9xsL", "Objective 3: wAxm23ElCSFqXDB4yYP3", "Objective 4: D0UXlcNab1eA3HJ79gwK", "Objective 5: N3EbrRQbhqFFglif0Yk1" ]
{ "os": "Kali Linux", "tools": [ "nmap", "gobuster", "john", "wireshark", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: K5ZdGPp0HnuVZudL0eXifuEg5hScqonFNnfhyxRHqxqqoHcAEInGiWA00aqLo2aO3Bl3tcsrNxspZRwPj6iOS426i9sjqtDUyWQDkSIIss6y5LZR99bw03UHrV6wI5K3hDAXVvuqKh9I2K0gdlJ8hX", "expected_output": "Expected output 1: 3266C4nmUvwc8dNwDmZMXgbjipLdkg", "explanation": "Explanation 1: FEL...
HTB-0096
Penetration Testing Module 96
Intermediate
[ "Reverse Engineering", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: MdIzB150Org6NfeNqhpr", "Objective 2: yeg6JiYPC1rmigNGoq2I", "Objective 3: cmSq1YEUWamt73npsZlw", "Objective 4: GPc7d8Gj8tfJanKE6JHj", "Objective 5: bn4dhmTF684E6z4CjSOe" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "netcat", "sqlmap", "john", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: ZKKB5d6OFYGPx1bBhf49sL3N1NXeIZhZ58wOUvNaI402c7pvvybaDuax2yTZqyKdDHtvOtY2dSX7ipSmgFob5lYgfrCxRQjPL8XcKGjZpiMTIBU1OqRb5KNo2lkwqxx0y8kqQFAmWFSrRmdT0QsHlJ", "expected_output": "Expected output 1: IS2FzsaUbEuhg6iF5ZU4eLCg7dq3tI", "explanation": "Explanation 1: kft...
HTB-0097
Penetration Testing Module 97
Advanced
[ "Linux", "Scripting", "Windows" ]
[ "Objective 1: JU74dbShnEFhQ8IVvYxS", "Objective 2: MgBZmW022aC2rs7EWvK8", "Objective 3: w9Q1xuSRhM3gXRETXoOz", "Objective 4: mG8tv7kuVdysnerRavpL", "Objective 5: Zg7TjPN8SJ38zXav0NNy" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "wireshark", "netcat", "john", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: mqpT1ox6aFEnDHBhZFxBWWvVQgfxwb4rYrxWCtsLnMUwz7YOtX9BQDI3izLJqujyf8bQg3sgqWEWgUrcHzbte9bid8gBcbspkDUGAAST71PVd4dyZbDNAv1Jnmc6RdjY1aHO9OcVytyTn2l0vIlkm0", "expected_output": "Expected output 1: WVvR65diLsmTDzJ8CGoNI6pWGnliG5", "explanation": "Explanation 1: jQB...
HTB-0098
Penetration Testing Module 98
Fundamental
[ "Linux", "Enumeration", "Windows" ]
[ "Objective 1: UukSy5ZXTs8jZahI30hE", "Objective 2: OOUWVexgQDGkuzZUBf7h", "Objective 3: YQTkvOw20MhenlNFyOHt", "Objective 4: iX5Dfn8hSSWcltBWNizU", "Objective 5: hnXy50RNlcGDEcoR1P9g" ]
{ "os": "Windows Server 2019", "tools": [ "nmap", "netcat", "sqlmap", "hydra", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: V8usWoJuoq8ngwIcvtRZ6wod7nb6q9Zp99U1WHQAhsY6i1NV75vi9LzvFtCJ3z28mapxZvEKLKbDP2hyGmS8ehfNkbBNrEr3TlqIu6qHaKNwG0FOBDxbcr94pU6Fdb3rbVmuRQ4l1zgJvey6KipUju", "expected_output": "Expected output 1: pxPzSg70oLibrG6MphFEfemBSS0AVn", "explanation": "Explanation 1: JzJ...
HTB-0099
Penetration Testing Module 99
Fundamental
[ "Exploitation", "Networking", "Enumeration" ]
[ "Objective 1: 3wcRjaTRWKOgVtdMNZH4", "Objective 2: woPdpuHMQ4H55NRKATBr", "Objective 3: MvW0E5MLLNrk6AYhgr3k", "Objective 4: jGXgbAhH3QpnyDpMJuBg", "Objective 5: zb3LSudEzItgMpE2b3ex" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "burpsuite", "wireshark", "nikto", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: b8WlpdrJMsY9EKVJkhdvh84qRGJFDxPB2eIXtXRDFgjWIemEyxFmCaWaF0yZiemup9bk3O4gA4hIX1PejsTRIaOA866TC6yjrVLIyicHLnhnZdDARDW1YHtkyUN7tPKpqs6tjuzZRZ7ujrzP8vXuRY", "expected_output": "Expected output 1: M0dsLLJoClbjAXPLFM1LXaIboqgIYu", "explanation": "Explanation 1: INQ...
HTB-0100
Penetration Testing Module 100
Intermediate
[ "Privilege Escalation", "Scripting", "Networking" ]
[ "Objective 1: EePPvVW7MR8FJI5Bmguo", "Objective 2: J4RuMR3BaoumD1blFO9V", "Objective 3: kcBi0hyuhOSnqid5dqw7", "Objective 4: w4Q2R6hFzkiMQS8uX9lo", "Objective 5: q8UjGl5GczwwfSP3fiox" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "nmap", "john", "hydra", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: mTxq5W1BSuTyhgqnOS4AoTULe2QMyTPobcN4VH8DRqRY2TW68USpDlR9NVmq1tt5ouZ50ol7aTD2MkO6YxSVZCBSZLkL86tcQJzYrWkNSUjSn0p3x03j7IJPkTySrhH5erWjJAIwrUBQljLJdp47Mr", "expected_output": "Expected output 1: 9AWkOo5pEh6wlgvVUXCQUIvkoLHRs7", "explanation": "Explanation 1: Qyr...