module_id string | title string | difficulty string | tags list | objectives list | environment dict | tasks list |
|---|---|---|---|---|---|---|
HTB-0101 | Penetration Testing Module 101 | Fundamental | [
"Enumeration",
"Scripting",
"Linux"
] | [
"Objective 1: XoGOMvycxW92BfUR3bip",
"Objective 2: Y5BNb6gWaKEMRqFloMBX",
"Objective 3: SHmYYtCQUEAQPnSKSeie",
"Objective 4: dlKKIUDfnDddy3w6kLBE",
"Objective 5: ldRgzuslsNm2ZEioFK9A"
] | {
"os": "Windows Server 2019",
"tools": [
"hydra",
"nikto",
"wireshark",
"nmap",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: yPW2O2RnMwNuoH4vJcoxbjNgLSiYEPr8DguqYVk5YB2b7L2Kx6hXsrxjFGlwr5H8nOa7jk8ELxDLYkwe2QnG2qHQj3BsNhqxQsC7u8SvfbNho71iPSgUP3k3ZagRWa0fda4IY94ET79QS45CWaLUy2",
"expected_output": "Expected output 1: jcb4HycCYd1h3Pal3Yyd3HldjcbFsk",
"explanation": "Explanation 1: 2C1... |
HTB-0102 | Penetration Testing Module 102 | Intermediate | [
"Windows",
"Privilege Escalation",
"Networking"
] | [
"Objective 1: 9XBXJuS0XJLCokGXDLID",
"Objective 2: hrAypLOVaxTMh4urY2JN",
"Objective 3: R6GnjtAwVLH7QoXerdai",
"Objective 4: Vu7EePLO3PaI27rrxe3w",
"Objective 5: FbVA9r7AWtyWYwc7S2HY"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"wireshark",
"nikto",
"metasploit",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: u5ERxrzWoWgVC5RaFH2FypvZZJiuy6lab4L7u2MhTcBNQ81az7SPycoaRcMgH76QSVP2g3EBIk0NuhGpyedfSDXrgxaRETjHrBwiMr0M2JGPLD5PjfPJ8phZxzfZCEsa4edjEXSW1T4dQzP3zPRkbz",
"expected_output": "Expected output 1: rxTDMShYaZZJhuZGkqRBPXBm02BshM",
"explanation": "Explanation 1: DQf... |
HTB-0103 | Penetration Testing Module 103 | Intermediate | [
"Web",
"Privilege Escalation",
"Enumeration"
] | [
"Objective 1: uSF25tbznuwsjF0KdJno",
"Objective 2: pspTMqgXVJhCRxmKcXCR",
"Objective 3: w3SLGOsk6l1kEgIVBGOf",
"Objective 4: itm4Y3YzTXFe3Xvoopdw",
"Objective 5: nWvo2KLjwP4wJwoREtz3"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"metasploit",
"wireshark",
"gobuster",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 1n1ks5QdFBWHTrB4HPr3YG1CTfI7p5hrEN4jg9PPJUatJpYlY13A3rdij8ZHJF6g6giuPj8DnKvW5H2ucrAmcJ33FekOQ6vrE2oUudiGHaRy0lB0lvgmPsFs4aYaSyykIqeCZ1ApRZfX8WaLJOwTd5",
"expected_output": "Expected output 1: A6VNvkTd1tFF2QNmf0mIMd5FBUFOym",
"explanation": "Explanation 1: PhH... |
HTB-0104 | Penetration Testing Module 104 | Fundamental | [
"Enumeration",
"Reverse Engineering",
"Linux"
] | [
"Objective 1: HkdnNRem2eJYcJoxQiTM",
"Objective 2: 3svFh7gibDacwXCgbDgE",
"Objective 3: 4wXpy24c8GxSl1BZVIwv",
"Objective 4: H3siyYCATALV0V2aSNyb",
"Objective 5: aDGsQ4HRwQp87WMYb6ju"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"john",
"gobuster",
"metasploit",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: xAG0KoL2ZJnYObk3oR1Fo4HUsz8VxFI60LD7ATkLMwevT0wvWv1iXtDR52QPJDHpS5o2gRGLvWsSRL3rL9RJLSHunyM3OXaArXcy7HqZpcakl76q7EW3EqPl8p687poY9K8iIWkR5GqWPfgvwx7gGk",
"expected_output": "Expected output 1: 57t0DtNgSFj2I6G2qnkAIYLlSO63KU",
"explanation": "Explanation 1: Zfp... |
HTB-0105 | Penetration Testing Module 105 | Intermediate | [
"Linux",
"Windows",
"Scripting"
] | [
"Objective 1: JtZ9l8z8zw1HqUj3hu8N",
"Objective 2: R9U4WceFXrIC54tbOsp3",
"Objective 3: wmxvdIWAWXukdGD5ehi7",
"Objective 4: 7bbuPC1sUHHxCq0nzb83",
"Objective 5: ApIg9IDNNaTdQjIW5RMG"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"nmap",
"metasploit",
"gobuster",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: s9ALknL6j9F1JwIEcrcX0xINDwsKdPAYV4xnGa6K4VXCru93ghHKbnaha2cjxgxXX1JVK52iqX56fAizRNssqjCvXMcUgLfqXJ78pYvK91bbzbYnmpmfSYm7rxtYe94tmzOimlzsvXGVMZYdXgC4Z4",
"expected_output": "Expected output 1: camakzH2WND1CQszGyLi7uWo3by4f2",
"explanation": "Explanation 1: 4dW... |
HTB-0106 | Penetration Testing Module 106 | Advanced | [
"Scripting",
"Reverse Engineering",
"Windows"
] | [
"Objective 1: WdhziLrIpm33WioTBv73",
"Objective 2: nJQSJW2BOdP146bS0jvk",
"Objective 3: X9siB2NPrhWGdR7FQxr5",
"Objective 4: okCfTNg1dF5wB9ggk0AG",
"Objective 5: Fqg0nAGpXwCOtbAAoJnB"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"netcat",
"gobuster",
"wireshark",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: gr4jLQUoTZ7m0GbZWoiDZjgTDtdNaH3rJD9V0ZZus3NAxGJRTsRcbzZmrduWHceL7B934MKLRvNjTRMuSCh2SJ0bOdlhoQRSEPe0yL0cqVAh5Lz5bipZEQnwJAMivmlWpb8jn3OWKqMZyKIAdzq0Aj",
"expected_output": "Expected output 1: EXZhKBnx2eR7P7rjTTGe7mqJpE5J65",
"explanation": "Explanation 1: fOZ... |
HTB-0107 | Penetration Testing Module 107 | Intermediate | [
"Enumeration",
"Privilege Escalation",
"Web"
] | [
"Objective 1: sPw6Upg64X2ps8dBbn6o",
"Objective 2: cfT0H1pZvZjMx93fMFGB",
"Objective 3: lbgrvnLxfr5bn8keHAkh",
"Objective 4: kEQfs8zaQsABQGGDEjbl",
"Objective 5: wnb9Xqe52UPuZLKvp5jC"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"john",
"netcat",
"hydra",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Z8OL2dqsTdaEMyLZE5zq0pVwL5wZg0hJS5w5TZCI9zTTGyBCWfA4T8ubb8kuwJ0QUl5DPIeoLU6ZYyIbxOr2b4LSxqd5XrzHcVdmue3EnmaFdjC8dnl0cfBVjlvNFPCdmVfLQv26o1wO7RrxF8Mews",
"expected_output": "Expected output 1: ELoeRn6GVPf3rSEvvrC9eq7LxrSe2t",
"explanation": "Explanation 1: rTs... |
HTB-0108 | Penetration Testing Module 108 | Intermediate | [
"Linux",
"Exploitation",
"Web"
] | [
"Objective 1: LJSP71tUbuTRVJosOKOQ",
"Objective 2: Kbt7E6ow1XUBO56iucCz",
"Objective 3: Yp70ZlHphafrTM60zPez",
"Objective 4: 9W554RsLUb4V9WrHXYFi",
"Objective 5: 7h8J38RlNOMzAJZNTIZX"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"nmap",
"metasploit",
"netcat",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 8x1vTYdoafNy7oF9CKQsDbVTjvSicQoUsXF6Aw4z0P3WLn1o47XO672B3sOTHr0PBa9EGxTv41LLdw2kY0kqcTfds3sV8SJSJPNeNO2arhNhNZ7BjaRQGLSmFEKZGvagxxKo3iigrfku5fag00xtdj",
"expected_output": "Expected output 1: 0gvYv1bjyqIFi44ydbvU5DpCUCAuMV",
"explanation": "Explanation 1: xES... |
HTB-0109 | Penetration Testing Module 109 | Advanced | [
"Enumeration",
"Exploitation",
"Windows"
] | [
"Objective 1: xul3YzEGeARZtmwBoOLu",
"Objective 2: uLeIjM1A8aCh5eLeR08I",
"Objective 3: CnIawHWPKDR6MpyzkEYP",
"Objective 4: w8wfgEbv9lecy1eGNNst",
"Objective 5: NZEcYJm3oj2H2ZT5zo8A"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"sqlmap",
"netcat",
"nmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: hTsxxDCZcEjTiRf4tbM84wylDcu9nhPEZclqNuvbohTWfMqePm9rrnWtoDWMqGP2ELWHwu9Wc7GZpP9dnTfOrhn87Z1mxSQZLkBPQAV6tRUufZe1guCnN6kldhSRq6LNO4XSmlOoux7GvBsm8hKF7U",
"expected_output": "Expected output 1: BIaKdfo0ZiqTnW3AUlOriVoarjSFgV",
"explanation": "Explanation 1: uv9... |
HTB-0110 | Penetration Testing Module 110 | Fundamental | [
"Reverse Engineering",
"Windows",
"Enumeration"
] | [
"Objective 1: PixWhtfLtgcXOF1lPqoh",
"Objective 2: ELGblgbBbJhYaJFP4qjc",
"Objective 3: rvW4TOd6c3nvb3hGmTR1",
"Objective 4: agaxjXwQkBp38DO67owQ",
"Objective 5: pWce3TUd0aWmAMoLzxlj"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"netcat",
"burpsuite",
"hydra",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: T5TIHNgenLrMr5wL3krJSvFG7pRMHP4Hc9hLyfoGPJAtkB7q4432xa3sHsbR4dJfMrlB8lE6ouVYHkW3KIAMTTcYO6NhoSHSVtETqJ5btZqHaXwGbAM815xeg6m4MFQniURJm0Lm0QfC4uCWvue4tc",
"expected_output": "Expected output 1: crApgzG8RBDEYOPweeNQTbbiQVjd4F",
"explanation": "Explanation 1: 3aS... |
HTB-0111 | Penetration Testing Module 111 | Fundamental | [
"Enumeration",
"Linux",
"Scripting"
] | [
"Objective 1: MpMtdNKSyJDxTkLhxWtd",
"Objective 2: 4JgDBPoU6OwO4Jjujm2O",
"Objective 3: hK7mAtggBggXJy1jEwp5",
"Objective 4: Q9sBAo18rXR6gXiAwOSY",
"Objective 5: biuBhvtfliLSkM8dIjG2"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"burpsuite",
"nmap",
"hydra",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: TfVzt2fv1tgdV9R9itDaIrOc9HqEULmAr5ARkEMEYRpx9ewzIIUSMLYqD47D378RL5Gmwx2FQYEjGCCNINk2jkVeIe6oFNf5TVPpRouF61WSPCMOiItNGA1r2ncm6kjdE3tlLtY26PQ8ntFfDVsuL3",
"expected_output": "Expected output 1: rhS01ozwJ4krOLLZeAoFOGSuMz3Y2T",
"explanation": "Explanation 1: IkI... |
HTB-0112 | Penetration Testing Module 112 | Advanced | [
"Windows",
"Reverse Engineering",
"Scripting"
] | [
"Objective 1: Vnq12Umcm3APbjzo7quY",
"Objective 2: SRyKI19FN9ywUyPMcBG5",
"Objective 3: VqZ025UEdxC6aTlrcUFQ",
"Objective 4: cNFQYsKXLJEF941pTh3q",
"Objective 5: GlqvhWu2TiqRCraAcGO6"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"wireshark",
"nmap",
"gobuster",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: U6dezT8egOUdQ88bXniatVrERZ2jBTFkYB2glD2s7j8c3uTm87wcGcE23orswaRYMHehxWzolDrBEk8N4DV20noEi3YeDcyQXE8QNgP9kPJF7w9uoiYquwnf7nriRT8vlJkkiXaPVxkgQ94xeIvW2R",
"expected_output": "Expected output 1: jNpADBzaaYU9oB8My8DO87gDlDVYsS",
"explanation": "Explanation 1: mh3... |
HTB-0113 | Penetration Testing Module 113 | Advanced | [
"Exploitation",
"Windows",
"Reverse Engineering"
] | [
"Objective 1: AEGf7f8ZtP5RJMXnVD5y",
"Objective 2: tyJXWMXU1B82JXk78bLv",
"Objective 3: QBpF813hvDMllflv4wkq",
"Objective 4: rfD1loh71NK2AC0NZ9Gw",
"Objective 5: CukctkT1MIbkvQQPtgYO"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"sqlmap",
"wireshark",
"nmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: g0fOI0C3sKEnCvuCtMJS2pQAJ0m4f5oeb7B0iKWJgJJDarmORFHAdL2zQebtn0G0NyptGHyso5rUt1pjGYJwPRXfniFQ4N90mpOXdxwVPUqGt5AMlFtbmSXoCH3nzYhXFbdKLETdxB1Cy7VmdUbv9w",
"expected_output": "Expected output 1: mSsPlSokt8bf1TUVKSB8MBUIaF4FhC",
"explanation": "Explanation 1: OG3... |
HTB-0114 | Penetration Testing Module 114 | Advanced | [
"Privilege Escalation",
"Web",
"Scripting"
] | [
"Objective 1: E8JI8gXpVUb58LpDDtUL",
"Objective 2: txLdAwQGBlnAJC26a8wA",
"Objective 3: aQ00lS1HhwwRwCtijRSM",
"Objective 4: P3y11yrLFfUGNYkG5Uh0",
"Objective 5: m5V5ChxGE1dxbLLJMi1T"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"john",
"nikto",
"nmap",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: fOyU8osGlfGWCbxGe6lKZ7HOAhWKu9uga33rWRxm8evWrsuv30F7N4KZDEqIane1hidkO7xbF9lw8XAMS33zSZyrxkHqt32NHJVMmW2SFMt3tl0Y2ZJDjrXa27aBB3xOXSZ1KuvHB8KQfAjtkmeEf0",
"expected_output": "Expected output 1: SaQwkfQtHiSgWiZzh3tXwLANkfn80O",
"explanation": "Explanation 1: mSR... |
HTB-0115 | Penetration Testing Module 115 | Fundamental | [
"Linux",
"Scripting",
"Networking"
] | [
"Objective 1: Ez7DgNDJAKOMHs1gpO0F",
"Objective 2: qFlhb5dkKF1ZkGRmfW0n",
"Objective 3: g9R9biAYlP3Hft8wkfAl",
"Objective 4: OwpFPGcmRcAmcaYnZgcq",
"Objective 5: wxlbMMS854FLDo1BxiP1"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"metasploit",
"john",
"wireshark",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: DmDpXO594casJSuYIF66FibRFc9Ch2TwnPUyv5d90ExOx1EadfpVIUIMjwLhSbaWBgQoG8Z0XPgyFX6m2WY8uX7ti19xiJ50cRIGxEDKYqtllVML6Ckuh7arzXwLIcAvTqRutxgqMKbJW9vZYrz4HZ",
"expected_output": "Expected output 1: 7WdLdDknejX3NsPQ6hlz0I825IHBUC",
"explanation": "Explanation 1: WUa... |
HTB-0116 | Penetration Testing Module 116 | Advanced | [
"Reverse Engineering",
"Privilege Escalation",
"Linux"
] | [
"Objective 1: mXCo54FkzPzf5oP3ed6k",
"Objective 2: XpCputieaB8r0LtgKibC",
"Objective 3: HDedbAvQpzxiTKo7m8r6",
"Objective 4: yRdA7vBq8gXN6JcSmyEh",
"Objective 5: hPn0sbiKXnY0c8g0uqKm"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"john",
"sqlmap",
"nikto",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: IHrvxgLmxZEwtmcCEY78AG8OxqkGmIpwNACyxWCc6C2yYc6VPOcU4tub73wLr1yYtpfHt2mUqiCRNdlYhT4bmZqMo7OTNpKj85RacQmB9dICk5gHGnGaTMAF6MOwPZomhGSuosSxMUl2wJJEjbWfFt",
"expected_output": "Expected output 1: 0tjL1ynFgldJqrd90dTRnmhfbLCu7m",
"explanation": "Explanation 1: LQT... |
HTB-0117 | Penetration Testing Module 117 | Advanced | [
"Reverse Engineering",
"Scripting",
"Linux"
] | [
"Objective 1: oaKHB9UcgqlDtRb3h60y",
"Objective 2: u5UpHJuyaekDw9vZRqSv",
"Objective 3: CWYWnE7owxBhcPhoa4KO",
"Objective 4: Hw9GpNXbl1PmD1pDs9oX",
"Objective 5: yTd6Gl725fF3bWORlO2X"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"nmap",
"wireshark",
"metasploit",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ZrFuRGUSPRDGIEIHLb54MNCrAIocCptBdsKVpD2u7jNPdcbCH05bsWniUCW1KCohNdDf8r8wTVfnA9KQhsSYA68t6BZg4fZRFaYMqjFfrOgAnWMmJ7CLy1BoOMlFOhVXQEvrS7LE9PmJZqv3uchDh4",
"expected_output": "Expected output 1: eYOipmk2eV3VQwx0e64ybWzaG420D0",
"explanation": "Explanation 1: maX... |
HTB-0118 | Penetration Testing Module 118 | Intermediate | [
"Privilege Escalation",
"Scripting",
"Web"
] | [
"Objective 1: lRMY9yiITGQp98n0mW7o",
"Objective 2: 01ImDOh0eREtXqmxWgk0",
"Objective 3: vmAKXLAyayo0Cniqr5oM",
"Objective 4: s0haYQA4wzTwdEJ4X34P",
"Objective 5: 9v1DL1m88Ue4gk3JEtTC"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"netcat",
"wireshark",
"nikto",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: w9dCoyWYqwv5c7NyHCVHjBAgmpFPixeA6Uq3f9gqbhL2Lrjh3Ti7C9vSV7wfL2uZF67yogn1BfR5t6uDSZ0BkdBI7VuIZ9uY6zYdqRZR1zFUEbsVWfFgCT6PHlfUbkpFSfmQhd8MbRxcyQbRNTAaZ2",
"expected_output": "Expected output 1: EcFoKeNrWl6mNj6JTh2OHFs66DPkUp",
"explanation": "Explanation 1: ncp... |
HTB-0119 | Penetration Testing Module 119 | Fundamental | [
"Reverse Engineering",
"Privilege Escalation",
"Web"
] | [
"Objective 1: pKSTxp7lqDvgygLmB5kL",
"Objective 2: oUNOBmqqUuUACQvaYSWP",
"Objective 3: YFLD9p8xjhT7uaYyEKoo",
"Objective 4: 1lyF6yBN1mAPsrmCtIiV",
"Objective 5: LH5osGrWdlRuGE9ujJFJ"
] | {
"os": "Ubuntu 20.04",
"tools": [
"sqlmap",
"burpsuite",
"netcat",
"gobuster",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: q55yyo8ANDXNNQmDxSbEHUn1KzlyStBOUgi3c4v9EaKikktpw0TF2UtY5DDYD35dB4FLCnOrNRD0gMvXGncTgBiyzdHDEIyL3OUO64OBb7Pc73zQlPifn516XgXKC7BSWiyLjwY1rS8gvzwMzwV7Hg",
"expected_output": "Expected output 1: oDgtFWKqGWDTkpJHhnFuFeihPEA7ak",
"explanation": "Explanation 1: wUQ... |
HTB-0120 | Penetration Testing Module 120 | Fundamental | [
"Reverse Engineering",
"Exploitation",
"Windows"
] | [
"Objective 1: eYSWw4WVrMWGoJ6BO5kg",
"Objective 2: RNMz6H08ovJMqO1Sx8Nu",
"Objective 3: 6Y6DAbsTyTbXPgFLcTti",
"Objective 4: PTe6U9NQiJYEH46Vo5Co",
"Objective 5: 5WjAPNZGVFhmaj5InjnJ"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"metasploit",
"nikto",
"gobuster",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: KvUFHPOUc9GLPSX3PWNoy2Uspi5VIEOagCVh5YOMZBxqIP3WqQxeLJeFGN4PsHqfGfqg8Gg6jsLq4kZ5q4SEecYRKzHty1ZlKSGgBVRXERry7kvAXUeeAwnjvh2ND5rFlL8BvoxENAxBDYEjERmkmC",
"expected_output": "Expected output 1: 7xDIbMIKgfXAzJypCbFWfR9vyFFcOJ",
"explanation": "Explanation 1: fOe... |
HTB-0121 | Penetration Testing Module 121 | Fundamental | [
"Linux",
"Enumeration",
"Windows"
] | [
"Objective 1: 7jm2lDdtsHK8t03K0LH8",
"Objective 2: DZ9U9ntUSvBdNFI98z4t",
"Objective 3: Jzkp5Yq6eEIwbPnmVh8k",
"Objective 4: 1pAE66A29GLwpGBb81mi",
"Objective 5: 7kp5r4OkLs6bNRKZJBWJ"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"john",
"burpsuite",
"sqlmap",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: TrPblvm3sIk7WQ1qaNOQD7AFhGdHBCCCAI6J5HQM5rZH39FNc95UKxt8QzXpPb36jDrmZegAP73CrbciHySZDMM9x2ICXrvIMAYmVECDoAfsxG7msY4tzb6xgzkzbHqcZQUWt3qYXB9MfhkSPIgAur",
"expected_output": "Expected output 1: tFjq7PwiIrRX2bFRnTdbrRPwpvTZ3z",
"explanation": "Explanation 1: 4nR... |
HTB-0122 | Penetration Testing Module 122 | Advanced | [
"Reverse Engineering",
"Enumeration",
"Exploitation"
] | [
"Objective 1: Rk7Kqo6Ta5atYW6M6x7b",
"Objective 2: fuY1oFqSE3BRbsYDt87S",
"Objective 3: F50eEJ0oNTlaXoG5gBqk",
"Objective 4: dNlG3zxnaTUTgTLvgiKP",
"Objective 5: Q7XNFIBtK2CISNz7nAd5"
] | {
"os": "Windows Server 2019",
"tools": [
"gobuster",
"nikto",
"nmap",
"netcat",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: vCapcNyDe2YT3rs5Qk7pPIHgkXfWxWZsZav7C17OmTpVpzuDdmGV9fJgzYeYmv9stuqaZQ8rQafuT5JeoIvOkiQ1NClhtqwcUkZtWgEaPxmWHV3D1XY4HbV6JGkgDAdB5XgoBULIwzzy57nO3CxPHt",
"expected_output": "Expected output 1: OvQmNi7B329VRaFom71gwP1OJ4Fep1",
"explanation": "Explanation 1: Oqw... |
HTB-0123 | Penetration Testing Module 123 | Intermediate | [
"Windows",
"Privilege Escalation",
"Web"
] | [
"Objective 1: 8mruvNEDmAemR6zpiIVm",
"Objective 2: y1e2h07VGNBYh9Qp6qvG",
"Objective 3: OMGwXVihs3EKwVv4M4BE",
"Objective 4: I1irGHnlcSS7JBI6TALy",
"Objective 5: QDr5qTKWuoe0UjzZ7oQ0"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"gobuster",
"nikto",
"sqlmap",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: einpOzXA00dRGpT3e7jlFccQLGqpJNAsUdofTSeCWUtIfZjhlHgXr2396Tzbanwk4GIviD02aurskkZRIPmDmwlji2TL0Afc0oBX0A8PLXv7aHLPb87M0oV1INncLyR6s6sbu1wrBmtUSJUVuR6Wkc",
"expected_output": "Expected output 1: eIgScto05tGpuGUrAM13VzkQfQrKHe",
"explanation": "Explanation 1: mCS... |
HTB-0124 | Penetration Testing Module 124 | Advanced | [
"Reverse Engineering",
"Enumeration",
"Networking"
] | [
"Objective 1: 2jbv0B1kswhSmjq2h5GK",
"Objective 2: b4kjxCd0VZKdU6Hx5yLG",
"Objective 3: Sc8iYCwt3N4LIAYe8Q5j",
"Objective 4: SIj7ScS0hgtwP7gkoT71",
"Objective 5: 7xNgw2DRgZb2aMNqYtFH"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"sqlmap",
"netcat",
"nmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: c6VXUCk3ajc398DuUtJzedAJvqcvz4fhINYWXRNt6cp8jiyKS1U6ylFeQoy32j1hQMA057GJHxH5VjqNjw9pZ5DoK8mZWhi0Bqe2r0HzJgI9vkiPbyy7VF79ZlCI6OB7dt9M8mPLWkUjdBARnvkAh0",
"expected_output": "Expected output 1: WJhpK5H7Ap5bhcLao7Mwn1fxPaKIrx",
"explanation": "Explanation 1: wvg... |
HTB-0125 | Penetration Testing Module 125 | Intermediate | [
"Windows",
"Reverse Engineering",
"Scripting"
] | [
"Objective 1: Pxhk9cKi7soN8fG7Fivt",
"Objective 2: YyEmFxNu6iuXov8tDz1f",
"Objective 3: 2KSBjtVtjH3dctUFwQoc",
"Objective 4: EzY4CpShkQyqDf2iZPh9",
"Objective 5: lWs6Z5INDOH2NA5jGAeT"
] | {
"os": "Ubuntu 20.04",
"tools": [
"sqlmap",
"burpsuite",
"wireshark",
"nmap",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 0DaL9EVNNzbepdeLE0uuHatvC8zMpggWjUbvaspYBOWrHP8CXzpGg7PoRAfb2nIXLAlDxzsSb3PfFFwparPGgiEUEEgRL4pTDVTH46Fi66Ceow20TnoDhzhgVNRlTclzT1bG2AYZoIWfcUlrtXMKuH",
"expected_output": "Expected output 1: cNqLZjaABXKV5TRxz7nbiz0cD86Dxx",
"explanation": "Explanation 1: Pgn... |
HTB-0126 | Penetration Testing Module 126 | Intermediate | [
"Privilege Escalation",
"Exploitation",
"Web"
] | [
"Objective 1: 4QVaYTny8vknIa7YkQo2",
"Objective 2: mTvaRqUaSBcP8YGrSoOq",
"Objective 3: 33eEZmsgq5Rnan4ECMC3",
"Objective 4: Jwu1JqsF2MZhsj8ucfZB",
"Objective 5: jHg1rBafCwlgejauWRx9"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"netcat",
"metasploit",
"wireshark",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Jr0En2aRT4ZV7EWNNjxzgKDyuJDoitTChRBkoEIFe4FTZ8Zhj1mKcGBbSnFqn4ral8gOb5v11mlC9vwXvEdHWxBFoKKYcZko8PvJkxmOMDoEWJL66JP29jzZR2FExJBjldTHzcqkZ1v7gsdmFYIx6O",
"expected_output": "Expected output 1: zxxLBTXqNpfssK3e2hlEcEASZpkUrL",
"explanation": "Explanation 1: RAP... |
HTB-0127 | Penetration Testing Module 127 | Advanced | [
"Privilege Escalation",
"Web",
"Networking"
] | [
"Objective 1: zWoF3NRv7syhvk9mpQRA",
"Objective 2: RkcdoEwkRXYbucwByGHT",
"Objective 3: IO4Q7CpxiN4hL48vljQj",
"Objective 4: KN8odGmv6FMABkClNgEI",
"Objective 5: N3rc15uQTbHuKWkdr3eZ"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"burpsuite",
"hydra",
"nmap",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: g5VTqG7ff6kuukWf1JOv6H9HHqJ2zZ2Xv3URG3cJTzyjdEfml5I9oJrLpSkHjgwj0DZUQaOUdQCIoETE4uPGCgnTlNJE6iFbZcXYB3MGDJ0dz27TlNlOZeZ7n7MhPZQ6ehpaHXk6AhkKZW9LJZFF7g",
"expected_output": "Expected output 1: M5skneRWXwRn4GAlvtZjnduE0AyovZ",
"explanation": "Explanation 1: MpP... |
HTB-0128 | Penetration Testing Module 128 | Advanced | [
"Reverse Engineering",
"Web",
"Exploitation"
] | [
"Objective 1: Swli9zSgXugSqMzf4zyF",
"Objective 2: 4nBjV0tVMFvW5KxrUfgu",
"Objective 3: n2DsDRGjWEC0l3aVP3Jh",
"Objective 4: 9CS0Rtw5M6pAT7TvAzQw",
"Objective 5: ltRZTS2Uns71XGZyDSE9"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"netcat",
"nikto",
"hydra",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: hJ9b4JEz4sdPlZ47GezofoQw290CiA1qH1NrHhj5Fu0V264K5i7p19OcwFkssz1iyQIjZOPK827zsa3zAEzzf2AIil65RS910W1lWuKofVNuUft2cJP9D6k57rmxJK2AEDz3AwCosqKz0FTLKsFCYC",
"expected_output": "Expected output 1: EZwfvDID7bpeAaYsr1WWywHTUrFOLR",
"explanation": "Explanation 1: 11g... |
HTB-0129 | Penetration Testing Module 129 | Intermediate | [
"Privilege Escalation",
"Web",
"Networking"
] | [
"Objective 1: p6bPi9Owl2pZA490uRVv",
"Objective 2: 1cUZiV1ybtxLQi97vTWW",
"Objective 3: bV4UdZeO6f9JWR71VJhn",
"Objective 4: dkXOXobH3CjfYUSMXxjf",
"Objective 5: YYnAsSwb5t613AabvDNY"
] | {
"os": "Windows Server 2019",
"tools": [
"sqlmap",
"metasploit",
"hydra",
"nmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: G6krxRSpJI6AskOZQjmJirYElwoYVtRjm32mg0cNOGZIiAjuAaVDJTwGV2Be5WvBX04GJjhfBOecKfm0PSXL8cZNV3p2jNB57mXdDIsYWeO6vNBKAkE8sA0SkSxoJE16rxhi5lbG8rezJz1skRGuaA",
"expected_output": "Expected output 1: hEHOgbxFUTOZk3eW77cYGfzbXuKCLL",
"explanation": "Explanation 1: 6TE... |
HTB-0130 | Penetration Testing Module 130 | Fundamental | [
"Windows",
"Networking",
"Exploitation"
] | [
"Objective 1: mBskDnz4QpYX5MBu4blX",
"Objective 2: sc9OTrtZhFAJgZcHwXjc",
"Objective 3: oVGQZNKkxvo5cWy6cxL3",
"Objective 4: eXO97tkaPTFIsfNy1U3j",
"Objective 5: kGSvObiMKHkEhrXPNzTU"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"hydra",
"gobuster",
"wireshark",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: XZf5DsoDBnaiXF2MBTX3WilxrcyQKswdU1MT7avTk0FTYoC8F7g8GHrFcWhiIrSsB9F15uYVgtpYjKa6pB7oika3am5guJMfy2kEDop9Z2M4IF6XhGYYXCDbtK9gp9Xso846GzsAHOsxFTJX6NNK4E",
"expected_output": "Expected output 1: fuuqkxLju7gXR3rc0TkCoaIDlAmROu",
"explanation": "Explanation 1: i4A... |
HTB-0131 | Penetration Testing Module 131 | Fundamental | [
"Web",
"Windows",
"Exploitation"
] | [
"Objective 1: lufj6HQenT2nvOiEVlHY",
"Objective 2: ve0isZFwcRpg4j10sxl5",
"Objective 3: pegbn4tkV9sSzv7dF83R",
"Objective 4: QbOdS8WGmRQyySHnbOaI",
"Objective 5: KFJEB1eE4kGIAN0fe1nQ"
] | {
"os": "Windows Server 2019",
"tools": [
"metasploit",
"wireshark",
"gobuster",
"john",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 1B4phHMyL7lokjLt9GROneXo1ydOsXSnnTpZgFIF4ahTuDCS9Rcuomh0dwhbu0Wq8VdqczJfcWWxkhi3Clnt23IejWCVS7Jllpgmk8fPbByZxqtmetMKEXS0GneOQvvAPZDdImhjqbZ0SWnCTuIDuM",
"expected_output": "Expected output 1: 5lQttI2yiPHBKQcB9XoSMtMtUvqEHd",
"explanation": "Explanation 1: 0y8... |
HTB-0132 | Penetration Testing Module 132 | Advanced | [
"Privilege Escalation",
"Windows",
"Exploitation"
] | [
"Objective 1: jXkv6ZhADAH9BfB9DWAM",
"Objective 2: 4y0dnQPDi40H8u4HSxOR",
"Objective 3: CAHFn5OvU0dZFkq08FVh",
"Objective 4: JpHqsEivA8RT53umSuRI",
"Objective 5: RDaTjkvFmffkJzzquCCb"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"burpsuite",
"hydra",
"wireshark",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: hwl4zGHRVezFEbtzLUZQS88m7pkONuB0jptC9O5dVbqXPtOs7rEnctHTL2BR3dhycj3r35FfrwJ7DRytnnM5gEwFt7QxsfAb8aDvnSFBGHb4tBph0tbhiwPWqUF1pgxIbbKw3h1J0FUAyH7GG05pV8",
"expected_output": "Expected output 1: qjBP8RIKrYDjHWQ8grb6Om4rsUCTfP",
"explanation": "Explanation 1: 9O4... |
HTB-0133 | Penetration Testing Module 133 | Intermediate | [
"Exploitation",
"Networking",
"Linux"
] | [
"Objective 1: OxHLPElolhrvbbUHkQ3h",
"Objective 2: ekK1oXyvlfxYieavcKc5",
"Objective 3: ULrWmFmYIOOrw1StZJZg",
"Objective 4: VnxiHwKb0fBoiDqcaOg2",
"Objective 5: MlNZyB5WvRY7cXodZ6yi"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"netcat",
"john",
"burpsuite",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: kCEtQPZQ9OKroMHuZ00MlPm0vjoeXTUMluV13smpBc9w1DoadEgC1zY2D6dkKy3SpiTlYa3ReoLBttxYyk6OfXyltgdaW4o5tXzl9nbL1q7cJ7EUxKOkmwhfZrHNdPO1B9zefgfUNYihHh4pt64ikQ",
"expected_output": "Expected output 1: NgGEc2cb6kBf1dn8PvqN0dLSYqJpZ3",
"explanation": "Explanation 1: uG1... |
HTB-0134 | Penetration Testing Module 134 | Fundamental | [
"Windows",
"Exploitation",
"Web"
] | [
"Objective 1: PmeJg32Rmo5XVKpwr0ia",
"Objective 2: fHUVeYOWzPyAmYhcteNA",
"Objective 3: voo4SHJCOVYA74rLhm9P",
"Objective 4: 8ia9ZFwtCD6o1ib4CLze",
"Objective 5: L3u9uxLU742tGtvCmOZB"
] | {
"os": "Kali Linux",
"tools": [
"wireshark",
"gobuster",
"john",
"burpsuite",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 2crzSSvWlYTzSmTOJYFIwdHTNCvx0imdgi3K9up6vU3IyZF4kgs69GMNM9daMkhKmbPYr9jQU2LGJ3OrylsU7GpiwpXAnSK5f1ZgcENPynRT9I06t0wu7m4853gG5oeEk6vUO2vJIsEbYqKRhqtC2r",
"expected_output": "Expected output 1: yhQ84mjz36fY3MiuAFxOxopHHkbnpP",
"explanation": "Explanation 1: S5W... |
HTB-0135 | Penetration Testing Module 135 | Intermediate | [
"Exploitation",
"Reverse Engineering",
"Web"
] | [
"Objective 1: V1ThsSuqIIMbtUGwI7in",
"Objective 2: 321Qq8XA4oXZTOxoTdoq",
"Objective 3: TCfl6esXI7hmv4IRCV8O",
"Objective 4: tdykrk7o0PqBqdnnZMo0",
"Objective 5: ieGt7FvtOnIhouKxXeSe"
] | {
"os": "Kali Linux",
"tools": [
"sqlmap",
"burpsuite",
"nikto",
"metasploit",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: NolycPoS1qU0iiNgQXsJNqz6fmvsEWgAZWtGHF288tujeEnwEgWYfUtce0IMjScDEB8QT2oNu1km7i0fHMBrZjYgZAUq0DKnZvwfdIXhxoIThVpYSVdwuJ9ndwIYP0YNNiSYX1WJlT4JONjzgT3o5y",
"expected_output": "Expected output 1: 8NmO23SGYVMPByOqEAqqwfBH5gNHDb",
"explanation": "Explanation 1: DYe... |
HTB-0136 | Penetration Testing Module 136 | Intermediate | [
"Networking",
"Linux",
"Exploitation"
] | [
"Objective 1: AmbkFnKXJtKwXlODC3LK",
"Objective 2: vE7HypkwRYOhqp4ELqE7",
"Objective 3: YNSy8k1hicrBGfXIz6XD",
"Objective 4: Z70g3Lj00cBt00UP70WM",
"Objective 5: BLszmYULWot2oGKdj5Pt"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"metasploit",
"sqlmap",
"nikto",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: vhvGDWq5Xh0tiSGOvR0d54efLnyuBDOo756U0N6jfmvgHYMPPi1QktUlR1E9ZA6fIfeosIejkApvA7vXGbGQhrq8Z3dSfTyPU5N6X4isaCZHtAnWf0eoXrNPGDQgEck3TOqHZPoGyxBzMebe56zhGO",
"expected_output": "Expected output 1: jfgDqhhDq821MJjkeWxVtythFNOXNt",
"explanation": "Explanation 1: Ntv... |
HTB-0137 | Penetration Testing Module 137 | Fundamental | [
"Web",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: pM6NpGb9zMtOfOslV3DS",
"Objective 2: o8VkPbDG0XISoNdV4p1K",
"Objective 3: RwlL6aRe8bdikB9wcXfx",
"Objective 4: ukZuEz6ixhOhkUchRoHp",
"Objective 5: gaZ5Pgg4OvnwhnYKvLUC"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"hydra",
"nmap",
"john",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: hWizQ2dvC3GhJpsByA0y68shqT7nadfdS2mPe0xhYmVDPi3aMN2gY4UW6GbejQG9dOK9KA7IUCw04a8FXCC0s0iYiskVaQadmhn9iQWcu4Omzrijp4cIuAW47CbzIgMPBy1v4hfSg7APgrFefG7CH5",
"expected_output": "Expected output 1: PqwxMZ6p7LQPF9iBP4q6qseyazRi8d",
"explanation": "Explanation 1: zLn... |
HTB-0138 | Penetration Testing Module 138 | Advanced | [
"Windows",
"Enumeration",
"Linux"
] | [
"Objective 1: iFGgGd0OHmWqvkVUMKVU",
"Objective 2: g0frX1JmaeG6qpmf8kMi",
"Objective 3: ARBt4EToyVXggVcgvEiL",
"Objective 4: u4MBNuN4Cio6fC4uQHoP",
"Objective 5: T584R81SnJEEsUm06k3d"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"john",
"wireshark",
"gobuster",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 5bC5biXACQOJ5LuHISNowoxne1IfXjbftmPq2sysVtS91b3gxVZc2R3XvIJplCobRYdINhjnTqv00RKTFBkAIfX1cXb6rhK6UfSpJMtSEG2qZL8UPfcM4H84nvWl0DKR0xa3ZYrSD2RJhaOBHbYMEe",
"expected_output": "Expected output 1: aZj1arThRhKOgnT8jvbehqHo4PzoCP",
"explanation": "Explanation 1: Hu4... |
HTB-0139 | Penetration Testing Module 139 | Advanced | [
"Linux",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: THP0tpZfoQhy9jNdmeYs",
"Objective 2: 9iVzFbAWoi4glWlutfHf",
"Objective 3: ZiMVq4l1R0BRgB77oFIW",
"Objective 4: z6ft7Dm8pSpazahme0wc",
"Objective 5: lNkI9vQAq5bcY0izmIkj"
] | {
"os": "Windows Server 2019",
"tools": [
"gobuster",
"netcat",
"burpsuite",
"wireshark",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Lkp19lEmLDdMJOQM2MBsaX7lzZoxfWqONl4CtgbvbVKR3pZ8d7woG7t8MidXj5pJqXvPeb4ey77cNQkmDldYcxPqqHNBMpJUJyLvLtYu68kwk5cjKOwNOwNg16Ze0wucZIX8CzbBVOpbE4uHw7dePo",
"expected_output": "Expected output 1: p50atfMVGWz3x2TtoxXu5hkmkqS5WF",
"explanation": "Explanation 1: UMo... |
HTB-0140 | Penetration Testing Module 140 | Intermediate | [
"Linux",
"Web",
"Privilege Escalation"
] | [
"Objective 1: OquHEoHlz73rkhh9vJga",
"Objective 2: JlJoY5fkI4QduYtO0jCL",
"Objective 3: NWH0NCRwxgH3OPcd1qRs",
"Objective 4: 4FAPaSCpbK4ZWf0lM25P",
"Objective 5: H93GhA7czK6dGByj9OxC"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"sqlmap",
"gobuster",
"wireshark",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: zdlSsJ3uSXN8qSRucR6SEZXJFigLArSKted62nAOJuOvgT81efmKoIpZtvgAXJWdg9qHJUvKvv6Q44PgRfBYchTiTzxWzrDyhNWGdX5s0yK8deaSGUvU2nEAkWnJU0N55ThZ0DrFy5sHXmE2XTyhET",
"expected_output": "Expected output 1: o2Vbc1s4C9g9xQt3Zc1eduHIJhiEO7",
"explanation": "Explanation 1: 2jC... |
HTB-0141 | Penetration Testing Module 141 | Intermediate | [
"Scripting",
"Privilege Escalation",
"Enumeration"
] | [
"Objective 1: nLaECwpVfmaFmOSzu3o8",
"Objective 2: sNvsCOz1fmSJZxOSIelq",
"Objective 3: ru8qfLBqkcN4Awo5Oc7R",
"Objective 4: vg6fshHxAsLzx9jLSzQr",
"Objective 5: YjHgJkVwGklPhSi5MCUn"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"john",
"metasploit",
"wireshark",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: YJ1u9hNO3BHQmaF4Z8xtl1kjkycpW4opOgKw0n4M0PLcDeDd2FhU2jDLm4hCKABw10pQ46fpIZCkJpbL0iDUmjKPJlZLHuVrjs6MgCsfWPDunPK7ZgIT707DtscYm4dXXPFdISBqbh8drDvMZ8uvYb",
"expected_output": "Expected output 1: L5WHeCXBGYxNUj0cnSsHZwO11h06M1",
"explanation": "Explanation 1: vaj... |
HTB-0142 | Penetration Testing Module 142 | Advanced | [
"Web",
"Networking",
"Linux"
] | [
"Objective 1: Ojkoz0VlankuRtyHm3xm",
"Objective 2: Ji6iFyQAQDr452HpUpjL",
"Objective 3: gGmL8E4MpRzWbh8SHevT",
"Objective 4: 9IfEOq3770W3Vj7FLSAN",
"Objective 5: wpoAGPoB06TaJoQwW4y5"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"wireshark",
"sqlmap",
"netcat",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 8pjL2v63C7TozZdEMIGOXprcqcNiSmiHIPgp3L3cleFWyD5MUCVto3ZKB7DBMmSdjZtzCEU70r4XzgzpJKfURxJIyp7umS4LyTGVLs40I8ZYcvYAusGjNoRgdh4R0h4LwNiAqjmTSpI2A47E3NaBGF",
"expected_output": "Expected output 1: p33DbNhsEYPvCNxjzKoIaFlZRkZ0AK",
"explanation": "Explanation 1: jGY... |
HTB-0143 | Penetration Testing Module 143 | Fundamental | [
"Enumeration",
"Reverse Engineering",
"Windows"
] | [
"Objective 1: hmsUj82WuVZHxqgjCi1y",
"Objective 2: d5Kv0qe0eZDO0cmIzNxu",
"Objective 3: goVLsBH9ZUJ2O5RogGnp",
"Objective 4: WsXDxc3K6oBfPBdQcsqz",
"Objective 5: 8AqiVo8ZrkUeF5bIkcO8"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"gobuster",
"burpsuite",
"hydra",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: LHfAQ84n0LrLBQyq85wzgxPFh2iuP4HIPlQ6sLjoPOFKCOGEG1mkPKxZsOxoLSQDNHMuuyWECU2ZGftjMtJp0i5TCKWf2MJ8AADOW6I7OAJUdMKQ9rDEkKRstLbX1xSp58l7WrAgJX1r3n4I3PyqRS",
"expected_output": "Expected output 1: VlQZoGBNaSK4LpZmDk1x12D2RW2uRX",
"explanation": "Explanation 1: bgM... |
HTB-0144 | Penetration Testing Module 144 | Intermediate | [
"Linux",
"Scripting",
"Exploitation"
] | [
"Objective 1: BTZPw61u2iRyDKmeUWvQ",
"Objective 2: 3aU9AaOsjRwy6TZfUCo3",
"Objective 3: AqckUivb77Mj0SLeBvuD",
"Objective 4: CIny2uBl3epP2BVZMnIb",
"Objective 5: NhBmak8KUns3VAc5eTBB"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"metasploit",
"john",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: fMtiJBTGtVfavVQX7eWyWtYJN4w68QJInb3hMNsWLdxPuaAs1vlgshfai56kbtUW8jVqb08POznauouVTVUMYEhMUehjvVxvvTjRYtdi0NUe5DgstqPc4IyT4N8VGoJKwdFgYHn9EMqvIvu0c3mLDM",
"expected_output": "Expected output 1: tBEMyjsgiElu3YvokLRjNozKgTN1LN",
"explanation": "Explanation 1: AIu... |
HTB-0145 | Penetration Testing Module 145 | Advanced | [
"Enumeration",
"Exploitation",
"Privilege Escalation"
] | [
"Objective 1: IkVc4JxKxw4gk8rtxNvb",
"Objective 2: ZZsFollsa4btKm20Ig6L",
"Objective 3: LUoCMQz1yjPiJkJIGa88",
"Objective 4: UzL8NPtHnOPw8r736eys",
"Objective 5: fV87uCndoutz6JvwJz7Q"
] | {
"os": "Windows Server 2019",
"tools": [
"sqlmap",
"gobuster",
"hydra",
"metasploit",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: mcj3PMPxBCxD0KIbxJz8GakqJp69Exbnt5ARTD83Fd999TDLQCaXe64rpSLLPmgTeLHKPBPUfwQJWVfj7Cyy98DLefLR3SybUZMWCSx0mSleISJUVgalsCwRPh0Us80IzxTJnH9ciKCsHMzP3mg30A",
"expected_output": "Expected output 1: kXxTzDll3TQjTk9iNH7lYj3QoGWSaQ",
"explanation": "Explanation 1: J2p... |
HTB-0146 | Penetration Testing Module 146 | Fundamental | [
"Linux",
"Web",
"Enumeration"
] | [
"Objective 1: ZZLnXcIMIh3gJAnOjXc9",
"Objective 2: bZ4XsokpbDnJygrsWabb",
"Objective 3: VuviqnjhKyZ1L0IqN7K0",
"Objective 4: 9UhjStiLFv3HNK3xEJ3v",
"Objective 5: olUxKMIdzPBlE3FjgPHT"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"wireshark",
"nmap",
"metasploit",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ZShF9RxHCRkajdNsibbrpDRQxOfHIm73DjlqkBe94r336BoQ0P966zjrVzXZg2X7dqAWJpRxT1aZoj6UzX8i6AazHMHnfZ4y3brnizc1rZICrTyUgfIOJgjXMXrcKK4IWki5TkBvyLa1mb5JMhkELw",
"expected_output": "Expected output 1: SX7AdzuOoX5qd5393n6BKCU0mElt8U",
"explanation": "Explanation 1: XUJ... |
HTB-0147 | Penetration Testing Module 147 | Fundamental | [
"Privilege Escalation",
"Linux",
"Windows"
] | [
"Objective 1: 69n8DYKtgAoO8GPUItTE",
"Objective 2: BORlsNMY5D3vPKNyy8XX",
"Objective 3: c9QRE6ONplv1MbigINpy",
"Objective 4: zfmlDAWVb60VHQtkrYAP",
"Objective 5: ueER1bMD54zgnZsrZFLX"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"nikto",
"wireshark",
"gobuster",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: RBXbs7sRBSUBA310OzVxSdqiHL9aDmqCqFyLwjaKwhbWiCz7mrpxFqkbja77hg303g1o27zvcj3rIWfOM2aGc3FAlOdF80ko49ev8ii5guxbbluV5KWYBiJlHgq1K48VkmPE11vFxn657z3Q6JYIf4",
"expected_output": "Expected output 1: uXcbG03guLV3LMgKFN1BfjdgUWb2Em",
"explanation": "Explanation 1: EqK... |
HTB-0148 | Penetration Testing Module 148 | Fundamental | [
"Windows",
"Networking",
"Scripting"
] | [
"Objective 1: 225YNhsEAnobQNxR6FYK",
"Objective 2: Ycfrv0TeXU6Op0eq23Bj",
"Objective 3: Ls10ljSQ16u7h4BJrG5c",
"Objective 4: s1isxm5SUaXHX0Cr9OMA",
"Objective 5: mFKL6BeRWQue7mBeKKlH"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"burpsuite",
"wireshark",
"gobuster",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: eu1AjxrYIs1MRY594pfeCAtnrRGJwOrHQlvqyKIZimInHws4aIPHCh3lVIYFzbVvcArp4e0bFqOPSfcmO8cGCWQKUtAmWkQZjDcKyV9JMBPIpJ0o3XuKZMAYm3cLXZeMnPKp7ThSietgVY892Ipl1V",
"expected_output": "Expected output 1: urvWh7zzVr7SBbDKVVpHHnEIxEwSHu",
"explanation": "Explanation 1: Gvc... |
HTB-0149 | Penetration Testing Module 149 | Advanced | [
"Privilege Escalation",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: 79b51qDdfMkjgcBXcBV7",
"Objective 2: sNhYmzKFcdUs3KUrJQ19",
"Objective 3: jBSmIUVCJ9v63882jQF8",
"Objective 4: BTQegIQRQ6xUbi1ZinAq",
"Objective 5: YvR3l9U4ed5ZEhNNb4W6"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"burpsuite",
"metasploit",
"sqlmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Jf404GCMjRYiz2Ma9Llo2fxgdsvWfi1SmKM317WfjW4rJMOpAR2HJv8o5PG84felLevnYJjERNswC5zEoxghb93TCoDLlqFlGnaWWXcl8VUEigC4vrsEiECyKW1XVkR9rRDynt49OqwxhyVYwE8JaG",
"expected_output": "Expected output 1: 4rjp3l1AboLT2ty9V7nYm6zfbRKL26",
"explanation": "Explanation 1: PEP... |
HTB-0150 | Penetration Testing Module 150 | Advanced | [
"Scripting",
"Web",
"Networking"
] | [
"Objective 1: Nmvh8iAnMdUhiztTUOjB",
"Objective 2: xGgNfoViNG73iG9gSKDK",
"Objective 3: bDMmR6QVwL33rgXfSGu2",
"Objective 4: GZPfVQgL8Su2M7rBxDeU",
"Objective 5: r2IkIdbXUBneXCBI83tK"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"gobuster",
"wireshark",
"hydra",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: LiZTIVAdzeX92k6QDrPKQ9wXL7KuTQn8wwi9BMdefmHFSyr5FJ8mkW7WIFGP40eDJCNazWXEiVKCI8ArEkl5hoLR9FBzM47UuDB0lgsUcCPDkIQyo88Y0DcOcqNIjq76kF7Sojjw5FoOymgD9LLqHM",
"expected_output": "Expected output 1: GnXZQ67rhAtR9xMeHK2FyNz36hOX7i",
"explanation": "Explanation 1: SQ3... |
HTB-0151 | Penetration Testing Module 151 | Intermediate | [
"Enumeration",
"Web",
"Privilege Escalation"
] | [
"Objective 1: 1hOFNm99UJzTtKbyW1Tk",
"Objective 2: 0jZr1d7aeyGiapqzVmOu",
"Objective 3: dFjdNFkSGO5Dy2OsFo3T",
"Objective 4: NRIkSDpqEEVou9Bl7PXQ",
"Objective 5: KHsKu99XGXec4QzXTXsP"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"nmap",
"burpsuite",
"hydra",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: pWmeHQ7PvNYpziLKZnbK0HLc5csD04aLVRGsWLkNRqGg9PdxM7ApobSvins8pzWvClJ16iYk5U0p6HftJKh34MJYsL43TJ4QKsptUeqqtWf2hyDQTJ0GWlkn81ksgscSBvy9Yoi0JRcWQFqAbfHgpm",
"expected_output": "Expected output 1: rPaAxGyViUnl2ODr2kYd3pocyqAiFH",
"explanation": "Explanation 1: qG9... |
HTB-0152 | Penetration Testing Module 152 | Advanced | [
"Exploitation",
"Windows",
"Web"
] | [
"Objective 1: e45ApgZdNXDWZSO0h1wi",
"Objective 2: 5uAuuYC8yLS5nM3WSqEE",
"Objective 3: BgFQyeH6A3932Ir3OQ1m",
"Objective 4: BVgONvlWRLtAUVx8rytf",
"Objective 5: 4Q6x0v3SpQBnSANza3T8"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"nmap",
"metasploit",
"netcat",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: HMOKn6ShRgL5U6TcERFMnxRfbDEz8qVgeASTPa5PKr4HA2aSloKvKndb97KT2vVvgARMtb37DWGaVte01CTrQDHMm1mlgPOfz0efhQwYnylP0QoBSgcGuFFqzBCNQGfdlR7ktBg5y9WpkYLEbstcuL",
"expected_output": "Expected output 1: 9CT04gvuDLg30sWU2qPW8HBPSjbqP1",
"explanation": "Explanation 1: 4Dt... |
HTB-0153 | Penetration Testing Module 153 | Intermediate | [
"Linux",
"Exploitation",
"Reverse Engineering"
] | [
"Objective 1: 4ll4olRB5zqxTAc2lgsB",
"Objective 2: oz9de80qPAXOkuhu9d8H",
"Objective 3: eCPhxR688KEtVRJrdkse",
"Objective 4: xJQi7TE4x1iuw4IRZDCd",
"Objective 5: KbABpr6fupJS2aFl7kke"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"john",
"netcat",
"nmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: jKFRVsFFCP22ysTUgZAhBkzSpYDOD466deZkphA6Dal974ul3t1JMVQv24LzNvaJPF84ME9YPNHcwJbnifaLJguCasQ9V0xvgRB5Kzx6lVggBMQmuJb5yasGYyawmv64vbfUQdNnvWNfXtWbPxcwxF",
"expected_output": "Expected output 1: XKDTWrqtWeeNaFdCyfA4Kx6sjBhRsm",
"explanation": "Explanation 1: xcd... |
HTB-0154 | Penetration Testing Module 154 | Intermediate | [
"Networking",
"Reverse Engineering",
"Linux"
] | [
"Objective 1: rIjRBp2sT8EtjARFwNtd",
"Objective 2: vyC0uMkJV0OAp6wSFXgG",
"Objective 3: 99sC2xTdkh9NdQyxZDZh",
"Objective 4: x2yBn3lnj39Y0ocg5sXr",
"Objective 5: hGRtsy2jYnNQ09OhFReW"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"gobuster",
"wireshark",
"sqlmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: doGYhVRBDJUl6WYrJIcwZlF36s6kQ1tNbBrIGDha2yVizrGBh5M5rJeZoeVl4iUU0jyk0B4m6MLlVhgmDQM7Pjq82MMcTzlU60W7Doz86PMZJL127PxiPRbIbGRuDLAw4DTtSRp6XHH7yu0hkJCf0p",
"expected_output": "Expected output 1: VubL30QDzM18dqcDV3EitwL9QR6zlY",
"explanation": "Explanation 1: 6kF... |
HTB-0155 | Penetration Testing Module 155 | Intermediate | [
"Linux",
"Enumeration",
"Exploitation"
] | [
"Objective 1: 7KpeMJ2ow2XCO1LipbdZ",
"Objective 2: HfTMe66V0Pi6YghnB86Y",
"Objective 3: xNtMuql0kQYOqvgbuivs",
"Objective 4: 6rNamcn5RZ8W9JWRjxIJ",
"Objective 5: TE3hQN19wPjLpmgMC5VR"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"metasploit",
"john",
"nmap",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: CUrpH9YjRMFEPnOtnPM0ShmWuGZPBx9hd282BivuHJIsIy698ThlLTvRCr4HcoMdyFVTu1m6Eg0Auz10dxixRmGS4Uhus5BDk1iuuRYng8b4d9NOsN3La2SbwaoU6RqoytD4ogNjApIj8XFHJR4iSh",
"expected_output": "Expected output 1: EZ80lT7QeDOykveokyQM4vuUyEaSzU",
"explanation": "Explanation 1: puX... |
HTB-0156 | Penetration Testing Module 156 | Fundamental | [
"Enumeration",
"Web",
"Networking"
] | [
"Objective 1: 5hyb4b8C2MwSAqat7yjg",
"Objective 2: 9O6OytTwplHKyHSDreSD",
"Objective 3: 7Cn7QNHQpFS1PMP6dRzn",
"Objective 4: y9Fd4uNEsnnv2LFjz8rv",
"Objective 5: NWioLhYxik2QIq2qZiQz"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"nmap",
"burpsuite",
"john",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: KBcIHFaJ3eSvKnHSqZDXuD35PP6vwMXxd72S15gR9E2Vm3IQ0bY50VN1dbYlidxS6cIBv12Pi3CNxZ3oBimmM53Do0GxOueZ5F3cJQXJfcukIxQn43HGc8HSBKQtdMMRJ6Vu5yDAmixtRqwBBNrEuo",
"expected_output": "Expected output 1: N1Sdupz5lopoAwrUMfHiiXny2jIFEQ",
"explanation": "Explanation 1: qx5... |
HTB-0157 | Penetration Testing Module 157 | Fundamental | [
"Privilege Escalation",
"Web",
"Scripting"
] | [
"Objective 1: 3d5jwoXgRVllazhlbR0L",
"Objective 2: hZbEUgf7a4ZVwYI0TQaP",
"Objective 3: 3X2QZkVszrtfIcYueRnJ",
"Objective 4: vGvbQVegwPjICJlTaskT",
"Objective 5: uVokJ4K6rX2AyHdJYr4W"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"netcat",
"wireshark",
"nmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: sFP8Yjyg8fed045rHRqRfaM0x6vNVhYDlNUVKuiDjMEkeVeboxrw09vZ02hyM7oQegpgVbdidRem2qiNFCeIc9LAjCnhpZNhqmsZ68NcSQYMVfia0pF1iuvhl0FJzjBM7gTTjdVbTR9oZxidxBEQS1",
"expected_output": "Expected output 1: bHqoteVdpPo9XJHtDNDJoQuCWByaJt",
"explanation": "Explanation 1: oe2... |
HTB-0158 | Penetration Testing Module 158 | Advanced | [
"Exploitation",
"Windows",
"Web"
] | [
"Objective 1: eo05D3OGd3PtrgEz3SQY",
"Objective 2: 3WJVvS4xCd9ExAquWI0U",
"Objective 3: N0CtCxrMCn6UzJEQ188X",
"Objective 4: z3nqxvzrhaFVoZXkyaiU",
"Objective 5: LYvaQXqylXjBKAWS5bin"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"netcat",
"nikto",
"metasploit",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: PTUrRjBM6mtYnBSE9KZET8mDB5ywkY6rRojEpGiYdYyFhHxZP91xjOjTg5cQkvB6ZtpI9p2BA0kbzBycvVfAZqTmsROjMQIz3qeNGmFbXJyfNW8W0fvUpIEIJgI0CMgrATOr7BppDeGhakEmlwlvHQ",
"expected_output": "Expected output 1: P2AK5CkN9mmeqkDvotLigZZVhx93lp",
"explanation": "Explanation 1: PHl... |
HTB-0159 | Penetration Testing Module 159 | Intermediate | [
"Privilege Escalation",
"Scripting",
"Exploitation"
] | [
"Objective 1: 7hXtwVCoAY0XxCAaEj3m",
"Objective 2: m8Rtdk4d7ka8ahYRIoet",
"Objective 3: gP50iOQaXPjdjt8urQrQ",
"Objective 4: gpMD5ZuwspNydhazGa1r",
"Objective 5: 67AVqNbcBLUlfuMYz50u"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"john",
"nikto",
"nmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 48IW2aKXvsvQeAIEivd6DyGSH6QigKPGB3dOGM3U4c7PD5UHT9speThCOFl3Gy4pbCTdYncvOsdZPobTQe77cOpURrK7WX5yQG5OgUeqLzU6yqju9ECwAJAYgXVtKHoZJSV9GaCzPKWUWJ7hmDMUC0",
"expected_output": "Expected output 1: 4OajOjjU8mWJmD4OdGLWVDx7qSvAHd",
"explanation": "Explanation 1: wbV... |
HTB-0160 | Penetration Testing Module 160 | Fundamental | [
"Windows",
"Reverse Engineering",
"Scripting"
] | [
"Objective 1: zvsnKOqEebB71IHtjWuL",
"Objective 2: nC0dMBJ9tdRF3JkxiWVH",
"Objective 3: ADme7Sq3J729KsocpiVJ",
"Objective 4: sGEhfjSMmcsOQCdNlFqU",
"Objective 5: sbJzsWjuMqLtf0vGnH4M"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"wireshark",
"hydra",
"burpsuite",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: MjO5cRblGA7Pq25GCorRLHrebQGj1eAlPKJndCQYAvKInUuqitzUHXE8jCMwK4ZLpRf3lRKObSSjcZWZzhKKyRYc7hd5qs0FgLHFp1K6sBHWU7bLr29nkrXslPSsr0uuuZEc6cZZEYUY3CGARXXEg7",
"expected_output": "Expected output 1: V49eG6baZuk3NSv0bjcCDOnj8JBcHY",
"explanation": "Explanation 1: pWN... |
HTB-0161 | Penetration Testing Module 161 | Advanced | [
"Windows",
"Privilege Escalation",
"Linux"
] | [
"Objective 1: GssCknEBqNiBBn4rsMKi",
"Objective 2: x8JLbuwUSwR0y8abkfiY",
"Objective 3: ynACBlyTrvnE4GWPGojQ",
"Objective 4: rmj5Z1L4sbRPeFk5CM2Y",
"Objective 5: us9aAHixtnocr2oWt3NO"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"hydra",
"nmap",
"nikto",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: hzqvZSeyEKMWnj3wLpsGaoodkUDduDcflXPEoBr4DMPXLbhE7qlUMO7RdwIhIjwY3hvr0km5BxeXgdwt2aSpi48Env6Sk6vpQO19xlRY0CwJ8xzRBIpdLoZZ8iy7s2CdBOz9c8x4c4TZk5yLFpnSax",
"expected_output": "Expected output 1: 8CsSdM13ZbIWldETBpFeEg5YyTioyz",
"explanation": "Explanation 1: IN8... |
HTB-0162 | Penetration Testing Module 162 | Fundamental | [
"Linux",
"Windows",
"Enumeration"
] | [
"Objective 1: 1wCxjybIuKoHZ7fjEGtQ",
"Objective 2: PxCBzcsmItZnuTUC8vDW",
"Objective 3: ewc9FNMDB4OhPcbAAwbv",
"Objective 4: LjVCulcIcPZH8ADf3jX4",
"Objective 5: laxbU09qofb6fSMKtBAQ"
] | {
"os": "Windows Server 2019",
"tools": [
"nmap",
"john",
"sqlmap",
"gobuster",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ka12inpGef3woSbvfhW4eJuuJuFbNgmcA4JjCmLuJouOzALPWz0LETI9UqLj9pEZk2lgYOr5sr6kvmsgAdNWhI6okKv3qTvOFNr2H6ikEVYf06PiA9YKov5tchkZczEr7Xj6yF7IKiVdJKImI4siZj",
"expected_output": "Expected output 1: tCcQ2IT9Jp5Ma5Jz2GVpqERqWtQmMT",
"explanation": "Explanation 1: fX7... |
HTB-0163 | Penetration Testing Module 163 | Fundamental | [
"Linux",
"Web",
"Scripting"
] | [
"Objective 1: rWB7GXzMMTsFN02U3X81",
"Objective 2: JXfipCs4ffwtsqSeFObQ",
"Objective 3: QORQE123j7Ahp4LU6xcI",
"Objective 4: 0nzWbFEkOSbzjJ2jkMGk",
"Objective 5: JK3IE89pqDhOSfEMkq9I"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"gobuster",
"sqlmap",
"nikto",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: fJSivlhmEZivMF2XkIBx1hXqP82YeKnVxVaoYKSK4rcjzYo094gBSWaFHGdzxHtZQ38USEj97BiMTSunP2rwWrxGWRW1QBskvgOy1Cpe1XrzeSLEJlI5KLM8qUBq79JMEfQPX5mzUnxDGrrEGVuRgr",
"expected_output": "Expected output 1: RGUerftgNUnWalzRcAf9nBEwE0UfhP",
"explanation": "Explanation 1: 2vS... |
HTB-0164 | Penetration Testing Module 164 | Advanced | [
"Linux",
"Windows",
"Enumeration"
] | [
"Objective 1: 1ME9tAY7N7KYt9Z4DczU",
"Objective 2: yOa29FxjP0upW80eheFP",
"Objective 3: kXWi2MjsTYmS58rPIj3M",
"Objective 4: T8duYYYfyQHxJ6MJP2xM",
"Objective 5: tg3lkAKi2PAzZgLbYaSX"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"hydra",
"netcat",
"gobuster",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Gbfh6GvXh87rTOBvUfo7RkzoVyR12rF9PJFJBHIR5UKQJXKsSkSIHMZbdzeVwpcEmf1VEvM3NdTp94zmmjEM2PZ8ulq4cSEY6hf3d7UUVgEtJeYoWOhaAenm7kqjaIvll130WTXeNBRnRF4BIrIU6B",
"expected_output": "Expected output 1: TfJNxZKO0vduZaQxx33UD5yYNXaUZs",
"explanation": "Explanation 1: Lxn... |
HTB-0165 | Penetration Testing Module 165 | Intermediate | [
"Enumeration",
"Privilege Escalation",
"Web"
] | [
"Objective 1: 1nZYqDeP3WjzdfkB0kVh",
"Objective 2: zAABbstZIAhA7FqMRj4Y",
"Objective 3: cX4V5SsOiETcWicnQY9S",
"Objective 4: juHT9gzoik44HZDGyxMS",
"Objective 5: Wcu0GZU6i6fNkVeVvv8X"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"burpsuite",
"nmap",
"netcat",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: vkLSXedNGeRtDoggc9wmt6LhyNSzp1QMMozVZJxmIpXfZlw0n3L6Ri4y2gG9BWNqGWl7fEi2rvkvdeKmJOxjt04ygWIw1XFERqPXPVwF7MZyZ3OlzBdhYXfHJBO0R3ReO8fZaMX7RvTW768WtLiMQC",
"expected_output": "Expected output 1: qBR7kTPyR61cbDeDudgkrH5Ojrh6N7",
"explanation": "Explanation 1: G38... |
HTB-0166 | Penetration Testing Module 166 | Advanced | [
"Windows",
"Enumeration",
"Linux"
] | [
"Objective 1: mKmn6DGVYJYDZZ8ZaJQf",
"Objective 2: 7dIUY9pC5r2Zz3FMyTuT",
"Objective 3: tx9j1Ao03FQIJIsdNZmh",
"Objective 4: kdWO0v12lWAjoiKHNoEu",
"Objective 5: 4V2Gu2uG0IBjjVWzlUjK"
] | {
"os": "Windows Server 2019",
"tools": [
"hydra",
"sqlmap",
"metasploit",
"netcat",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 6YAri1LZpHrgp2QqFlFEjARadjRrLdt5KHHWIIcYAAx5jFf82qVv2fS5WNhMkGYC1JwLypr8bxQx3hwhjmcvSHBIPy4u3yKfzCte9q1gfgFBzJML9qHpfl0LTUkIe2rHTxbB3eAGc2TOMU13ysNIQT",
"expected_output": "Expected output 1: 87wVcvy8Mg0bhRnQjGFVfwxJpQC5Cn",
"explanation": "Explanation 1: HKB... |
HTB-0167 | Penetration Testing Module 167 | Intermediate | [
"Windows",
"Networking",
"Enumeration"
] | [
"Objective 1: 12ioKXE2wXLjUOMDOmkk",
"Objective 2: R5dxgO5Y7H7slsPlvcrF",
"Objective 3: e6YBbCoUXO8KxDEe9F1a",
"Objective 4: drlqmAxIKeRL0wPzFaGu",
"Objective 5: QoChSQ1f6HYBwYaaJjyu"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"gobuster",
"nikto",
"wireshark",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: zaPVuGd4ut5z6HuM3hGxljUVXGyrWqa9OWMjXqmqzKcCQrHX1OVyOWnD1SpRjCHU9CLpYouchfijyu9os689w5LP6njQkFJtHdfdsDun0cN7DHVcVyg2ZNx8M2Hpekwlc22EE8o5ZeTZZAM7cZyZ0d",
"expected_output": "Expected output 1: vC5yeD2K8kwaop0XXIvEyFe5MalWZF",
"explanation": "Explanation 1: UG2... |
HTB-0168 | Penetration Testing Module 168 | Advanced | [
"Enumeration",
"Networking",
"Scripting"
] | [
"Objective 1: uQy26vh6CgSKEGdBkVYw",
"Objective 2: P6Zqrk3cZot0G4cphbpb",
"Objective 3: 3mLXMydxZqzQC7hvU7Oc",
"Objective 4: 3YhrGWx5nmef2po3lmMl",
"Objective 5: MJYa8ItA8QsbYPnNpv2c"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"metasploit",
"burpsuite",
"hydra",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 72WKIQsupX0Foc6WPg8iokSM0da1L16WhmqkKGfBDn2QfGUMsExpgWAqZPKEnlbS8UtRch7yLhlITGnahulczXfB7eU9A5qVOfpxK5obxorJozMw3niTGjKsfrXCCVGufJ5YEUEGYZREpaxILB8Sjo",
"expected_output": "Expected output 1: HwqKdp0Qo0vAIMYOGXWEaUIrgNljYD",
"explanation": "Explanation 1: Slo... |
HTB-0169 | Penetration Testing Module 169 | Fundamental | [
"Reverse Engineering",
"Linux",
"Scripting"
] | [
"Objective 1: lVdPQTQtgpC8V63PJUVC",
"Objective 2: 76AnXZ6mtvY6jZW1bE9p",
"Objective 3: iuDeYV9yGMLAYCvf2MS8",
"Objective 4: hFtNkznmgcCwaPi4W8Kj",
"Objective 5: 2ipJjY4m6yAwSJWN2XFf"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"john",
"hydra",
"sqlmap",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: r3LYthwnC7x0vW322P1A8u5QzTHkCGtU59VSDRAchftfrNCmGL4YcNniRfpyGvivxLJbToGsnNaTC1I4cPhBKkMC4k5QJ3c3H1qy0AiPxaPTlq5GmXaCLjPnOWcKZIBotK8CKlxR705r7cY0lKeSxP",
"expected_output": "Expected output 1: fn6MoitvZWrJwl5z9Pk8iJexTi7Gkn",
"explanation": "Explanation 1: nkL... |
HTB-0170 | Penetration Testing Module 170 | Fundamental | [
"Exploitation",
"Windows",
"Web"
] | [
"Objective 1: HHJJqRecezaJqrwiHd7F",
"Objective 2: SQvdhaeWWaml48Itpixw",
"Objective 3: DrJGgpwdfqHmKosMdi1g",
"Objective 4: b9zeLE3YoklwCEeJlaQS",
"Objective 5: B5SuE77mlMthMp9VarPR"
] | {
"os": "Ubuntu 20.04",
"tools": [
"hydra",
"sqlmap",
"wireshark",
"gobuster",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 4dIYX3lAc4bnyRJvqqAt9zgElpzg16cQNzsCenOpbGmIFVDA7UEh3zZd4bahlFX7DUZxR9P4SYdr1rjPRYXReMNzNL3Sdx1yhlC4gDXAceXjFHeDI1JXR50UwicDAqEcjkxiaHGfmylsQRGurhpPf9",
"expected_output": "Expected output 1: ZIpNB0nEHN49f2w7PxTcMQ20eW4qJE",
"explanation": "Explanation 1: NTp... |
HTB-0171 | Penetration Testing Module 171 | Fundamental | [
"Windows",
"Networking",
"Scripting"
] | [
"Objective 1: 5HLbfA46G3KfainrkebK",
"Objective 2: ovzW2W7V60aVt2WsICi9",
"Objective 3: 1jsCkATx1AZbJQ8mKZSj",
"Objective 4: EfeQffN0DiRxJ7HhLBdV",
"Objective 5: iYdQkQ4UAJOTfUeOH7S9"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"nikto",
"hydra",
"metasploit",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: it6s3C2JHhlWxPsppeMB0cWQL7OiyQgws89OElgNFjd465b8txO2uomC3lZAcDV40it2O4QLTcIzAwgBtM9VAcNLlSaOqjVuCfNLFcWphLdgAKZMEByUBTNNPvX4Cxyld8uxvHBi8y0lSCkmnbC1Nl",
"expected_output": "Expected output 1: vcAvVGs5DQ7hFLd0G11noZBTychNs4",
"explanation": "Explanation 1: N4H... |
HTB-0172 | Penetration Testing Module 172 | Intermediate | [
"Networking",
"Web",
"Windows"
] | [
"Objective 1: SAIZKxoW9R2ktdKiDvpm",
"Objective 2: mDs4kOvFq93iLUvb0CJz",
"Objective 3: n1ZnKhtcZHbvlPh8KgC3",
"Objective 4: 1prlFsetBE5UQvLmdVJ9",
"Objective 5: jxRj2oBj88Sy5VneBydv"
] | {
"os": "Windows Server 2019",
"tools": [
"sqlmap",
"nikto",
"john",
"netcat",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: pLv9oftnObPQO8LoQO6ChydzG2INmArY3dXVxXAXFuPJ1JYCoayBqIrz10RsZHn0jibhIYNz1cknbrKjRmbakdHAYXtNWen1XxfHvPA3U6hOva0nPaCtoLmj7L0AyuXuQhwAqv2DQg0l2MEZdt2izb",
"expected_output": "Expected output 1: wYby9DFvE6APwKJTX25RHwhEFqQtLq",
"explanation": "Explanation 1: o7T... |
HTB-0173 | Penetration Testing Module 173 | Advanced | [
"Privilege Escalation",
"Exploitation",
"Web"
] | [
"Objective 1: GqcJf1Io914tZ5lTsQVG",
"Objective 2: oznijvwUGlCsborcZBMp",
"Objective 3: k1MCCNEZzzJMlAa55tfJ",
"Objective 4: LSEKG9r7Lum2HzcSZNfl",
"Objective 5: vIaJ722I2Mb01440UfQL"
] | {
"os": "Windows Server 2019",
"tools": [
"sqlmap",
"burpsuite",
"hydra",
"john",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: yGTghx6kqZgda2yLqgFEjFxNUkDXD21UMxYmUDmgPRuEzNWsYusda6im6mAoXCaTwLGQZNKBDoGaFH4hMc9NwARJsfNQ3H5c0ipXO052HB8Mzh4awjEnmWwGzDfdLHN2ZGeG245GXoWwVOEVnd7bEe",
"expected_output": "Expected output 1: MaODcGbtbcFkjFSht73MaAVnGO5Hc1",
"explanation": "Explanation 1: sCQ... |
HTB-0174 | Penetration Testing Module 174 | Advanced | [
"Reverse Engineering",
"Linux",
"Windows"
] | [
"Objective 1: vCqAzp991lvXNSDVOHeL",
"Objective 2: eUof8t7Uckxk18LP8CHu",
"Objective 3: 8pDovOBkrIgSDONlwvqy",
"Objective 4: 5rRUszIEvxxUAXJfaSly",
"Objective 5: v2o0PsHe6Dcx2x6TWgV6"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"gobuster",
"metasploit",
"nikto",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: bxT3BokroH2301zd55DDKh3qQiSyoUIwlyQGwEySF2suQqnJGBhHF1do2CEpYqCKnoUBw0VQ6q9WCDQGMfCMqPIgAMa57ZeL05uds2OsYZ1LmMWhj5u9DgsNCJWgjcQ8mbURlpZ9JOSzcrhKqd6flI",
"expected_output": "Expected output 1: b7aZ0dyGC818tReHmwPhyYcAB4b8Ea",
"explanation": "Explanation 1: S3X... |
HTB-0175 | Penetration Testing Module 175 | Intermediate | [
"Privilege Escalation",
"Exploitation",
"Web"
] | [
"Objective 1: swsd79hkhhxIT1D047nx",
"Objective 2: hepQAmeplEO7p5xvajrT",
"Objective 3: X6c7XD2feGVhcmUGrgIc",
"Objective 4: jyC4nsanja457v5XrtWv",
"Objective 5: JpceyDuH9ED6KiZbrLcc"
] | {
"os": "Ubuntu 20.04",
"tools": [
"hydra",
"wireshark",
"burpsuite",
"nmap",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 49tyFwBmovkFH5PqaYY3asTLo2s8viPt7g7N0lhDm33LfwewkvnpXcHmOd9HkOQ9ywpyrOpwfDXWKlGS2RfowLW61hQ6cxzcG2fRgwn55J5usuKho9gS1FydjISXoBMQdGXUHFljkfCtHet4eyFpeR",
"expected_output": "Expected output 1: SLN9YD5zhp9Ulveuwuw53iNfdKk8x3",
"explanation": "Explanation 1: Gby... |
HTB-0176 | Penetration Testing Module 176 | Intermediate | [
"Scripting",
"Networking",
"Exploitation"
] | [
"Objective 1: hUlZBnAuBsW30ESHpgku",
"Objective 2: Rjm9vknnY57stzCEqCWH",
"Objective 3: ECa3HItjyFnyo8HUGQnH",
"Objective 4: BhFSRopuUt2JotZPURLe",
"Objective 5: fw2iinoiUvwbnSSz4maI"
] | {
"os": "Kali Linux",
"tools": [
"john",
"sqlmap",
"nmap",
"metasploit",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: dmPmRiFcy87asykKP9ujilIlHnK0yCclREUUpebbtD8RVpzeHh8kbgJOiZPIwuU34e2E9RXk40nTxHjreImlTZPqGRZ0azSnIaJEQErGUHNDl57nBtGyBpPKNo05Ty5fPllyEOuSsH7QNXRWsJ6PzG",
"expected_output": "Expected output 1: eCCjh31wTUVvXXT46EZ1v0CsknDhPk",
"explanation": "Explanation 1: Yhd... |
HTB-0177 | Penetration Testing Module 177 | Advanced | [
"Privilege Escalation",
"Linux",
"Reverse Engineering"
] | [
"Objective 1: UnQUylPoeVluCmGIXWHs",
"Objective 2: tC3Ln8JBj4hpH6Jk5KbE",
"Objective 3: PwY9u3hXC9w9TDY3cMXP",
"Objective 4: 5Knw74RjpISoufnvP38c",
"Objective 5: LMHUQYJC99lIXPre8ZbE"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"netcat",
"metasploit",
"hydra",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 60R0T8ctebudyP8DlJub9sQNS8ug4uhwr3ilLx9zD5mTzEZ4viP7IjRU3U8tEKUGTde3Otz2HvQHGrdBTxLGUBM127p04eNxYb3gF9yZeHLfrRHbLW3vv3huOJaHBPG9sZJSUh7s9ybkxaAdAw6Bpm",
"expected_output": "Expected output 1: dR50USysABolAdJqkFHCgX2TnRoTjg",
"explanation": "Explanation 1: vvn... |
HTB-0178 | Penetration Testing Module 178 | Fundamental | [
"Web",
"Scripting",
"Exploitation"
] | [
"Objective 1: 5TbOogWfyT1iW7ERKt6H",
"Objective 2: 1oXDBesVuejxh5ca7hb4",
"Objective 3: ixSqOtSk75qhxucVz8ap",
"Objective 4: E5syMK8exxmILHZMvfHE",
"Objective 5: qOZCLOm09vJZdV99HN6M"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"hydra",
"sqlmap",
"nmap",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: OnRYO4JvHmvqodRWHIUC1PImk2lFy6j3kgh6EM9LpndDVXqe9rBpK9U829FILztGeTcF8uS9QOJFy0FiqpBCxuLIKY79YQAgCO7u8HzgqTv6DT8Q9s12DMS0stVd26AAYFGfXzd7TqiBLVmh3sDDPa",
"expected_output": "Expected output 1: c4l3DYH9lpC6WBAYt7y8i59vGNBDHY",
"explanation": "Explanation 1: SAn... |
HTB-0179 | Penetration Testing Module 179 | Fundamental | [
"Networking",
"Enumeration",
"Privilege Escalation"
] | [
"Objective 1: ul6DBzBRcgOkeeyN64ka",
"Objective 2: XjNAiQp3ApGf6hLYG4oh",
"Objective 3: l1oin2a0Z1eQjaOeU7MS",
"Objective 4: LMYf18n8vBlvnJtkkSTT",
"Objective 5: KwKLpzGxFNkkDbQ8Mx6Z"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"john",
"nmap",
"metasploit",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: PSPci651u6qqyoABhkAIaNaaYYzaIz3pDGlz384U1eLKbcJ19J05nZ3aEa7Z49KkXyMIteibN5Kav4JqBQqeXRIejMyfANpzxtVsK5S9G1H8N5Wx6WM673Kg8RM2oKO5PUL8yfIbca7O9A5G5iliPA",
"expected_output": "Expected output 1: bRay2QCNEPYyWtT7xzZHSCqZnvxQdC",
"explanation": "Explanation 1: k9V... |
HTB-0180 | Penetration Testing Module 180 | Advanced | [
"Networking",
"Exploitation",
"Scripting"
] | [
"Objective 1: hXiN9eel8hG2jwBDFe0p",
"Objective 2: kRsHRy8oIujCKlB3ycjp",
"Objective 3: QVg34NdZBLd1G46OJuur",
"Objective 4: VQHHO9M6UZXUvPGLflhi",
"Objective 5: QIMQXQC2t7Ro5VLmgEnR"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"gobuster",
"wireshark",
"nmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: V7xs4WwDfZVWI3UUlN4j3v50yYEfZj7wtaXN6VbKfM7424YOC3liGUKTV2M01ygLzwDYxlwNG2YM1R7aHOuw49JsobirQOOUEjqmSBxxkJeLUdM5qkrYfmSnNGaDBD3JrVjpkOizuPNGXt9Osa3Zla",
"expected_output": "Expected output 1: TOa6cgrDHGzRhE2tfhbJ2sOdgMyCVG",
"explanation": "Explanation 1: rh8... |
HTB-0181 | Penetration Testing Module 181 | Fundamental | [
"Enumeration",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: awmqNR5sagRfnQfyhSDQ",
"Objective 2: nTTmKFWpBhYUhlCJ1INc",
"Objective 3: KYorAqMPl60bBLGmtfI3",
"Objective 4: tt99O1zR8X9e1zBWIxqf",
"Objective 5: P2okfAHqMvbkfHDt3Nu1"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"nikto",
"burpsuite",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: tBA2phlzW6ft0IDWOsuHCz7Ec29odPiy9WHqugC8XCxazjsDlJHBXYIWC81C5JDmYqbElsRm2bLbUZQeRlM2k5YNikOSLlnuVYDdSJnGIy8CsLnbQqKvJ4q5bIjmS6CWlOEQNh0mrPct6Pk1sgh27T",
"expected_output": "Expected output 1: IRlNSYwALW4v4hI4vb012OESx3mK6W",
"explanation": "Explanation 1: Un4... |
HTB-0182 | Penetration Testing Module 182 | Intermediate | [
"Enumeration",
"Scripting",
"Windows"
] | [
"Objective 1: m2pjR8nyzrKXZLAtbkHM",
"Objective 2: Zg5oHFN2ZRi9kT5TN5yW",
"Objective 3: qd0z7ccwbCRTWSWJNFvU",
"Objective 4: Q3Vx1l3kncA1sP3Exha6",
"Objective 5: pwBTlCgrlL69vPEtNoY7"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"wireshark",
"hydra",
"metasploit",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: f1F3mXhZfpVwzXdY1IPOWLvd0Bzq5Jqkmxj59Ee0PbbB3C26U3WpmbzitkE8T7YZV5FPTmZYUCIxDyJQfTOvZcQ2ZUXoaJgKYLNlQUAliI0Vh4CPlW1dYuz3hZ9GCbjH5mgBx465KHYuHKeiYICuCY",
"expected_output": "Expected output 1: NkYBxF1xRzwcoAvFxUtxvELNOfvecB",
"explanation": "Explanation 1: MPJ... |
HTB-0183 | Penetration Testing Module 183 | Fundamental | [
"Reverse Engineering",
"Linux",
"Networking"
] | [
"Objective 1: 5TNvajpoZ9RJgmQvjXY3",
"Objective 2: ySC0vU8qF5aghMikvPew",
"Objective 3: MNuh4qGUh9Fcch1iEQN0",
"Objective 4: lrB9h4ooed5jnGGErOIP",
"Objective 5: fRK9p3m4bMU6nAipEbla"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"john",
"gobuster",
"wireshark",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: iG2dcjfqHayGddda25suJ9jPlNVOvoPKueW8PLM77EcXFxjAVk52oF5x8K08NV2TZsW5GdYm5Fn2v4CRDacE73xXYKXB5kxIBniH6KsMINKcYFc7a8cgAptRB5TQ4kwdt6TtA4bGrWcYXgzGsOsXZh",
"expected_output": "Expected output 1: FO9lTleFItvlSWNP0DKT6uwqfHKHbd",
"explanation": "Explanation 1: F8u... |
HTB-0184 | Penetration Testing Module 184 | Intermediate | [
"Web",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: jqJjkjr8GALaW2kMWQza",
"Objective 2: Pse93KlfPBf9gf06A7Zm",
"Objective 3: dTT9loKpXIcQUyxN4mfB",
"Objective 4: MdZe7ULxOrTa2shSyzKt",
"Objective 5: OLlFafFJCQfgj5miOMm2"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"wireshark",
"gobuster",
"nikto",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: QaiUPVITnaS8HMNWqW7RGKrCbRN6OMCfwcauzshKfxu13HMJRrP6fVQhTQOXIVvhjFTwN0UkYWzuv5dP9A1k3IR7Od4Z9BTdnUYIvYyf9wQxV2Yen8Q2T1TIXHYwH5SUeirDnqAFJj8R8T4JnQYk3s",
"expected_output": "Expected output 1: 6bEfSxxF1AWZ4Dfn0ympWtEpGLlK3e",
"explanation": "Explanation 1: oIR... |
HTB-0185 | Penetration Testing Module 185 | Fundamental | [
"Enumeration",
"Exploitation",
"Privilege Escalation"
] | [
"Objective 1: sLVwETIFS1xSrzvQcrZy",
"Objective 2: iL1oUrXCuQwYNknqay9L",
"Objective 3: NWE4sCfso5CbpY9QS6U9",
"Objective 4: 5uOujBGheA24k8x0s7mU",
"Objective 5: AeTG0tLniQXgB6KLh69Z"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"nmap",
"burpsuite",
"hydra",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: O35Dk6BUF8kpnz5XhTm6sEHAPeQ7d5o4YUGTXaQyxUUea11hAjS6EI6mNqHAUc8mmhpdQ6nXvtOr8dJ5ANPSisAsdofbnvs0hvcacmQ3nRy512QgLF1rw2gVaRW7t12hdLqadYZc5dyH6Ux0zxwMia",
"expected_output": "Expected output 1: JBD6B5KlaDf6VlG4hIH5KG4hhJuUCS",
"explanation": "Explanation 1: g4n... |
HTB-0186 | Penetration Testing Module 186 | Intermediate | [
"Scripting",
"Privilege Escalation",
"Reverse Engineering"
] | [
"Objective 1: 7jFV8HPyobHKRRujkpQp",
"Objective 2: c70mnSCuXkE8EjwVfyDR",
"Objective 3: LaKKwJVMlBxO3XT6UzE3",
"Objective 4: 9vVDiinpgP86WAln66T7",
"Objective 5: iUzUoYrZLM10fTiqUUrC"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"nikto",
"netcat",
"metasploit",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: cA32M7CxZ0GMtrjsNHi22MVPKyeT8t1SsKPHAz4ukAJLjMs1iK3faTPhdbaYUhSociZjAoIRFXhDdvKs6dR6GUTnOzwg2feh4SkSWZNuSzLlBR3FFMEDYVgvY7iTErXav9cCarTuaWQi2yw32EdtiS",
"expected_output": "Expected output 1: XHSmHnB5yrFfNK3rRGbX787fBtQp33",
"explanation": "Explanation 1: y0j... |
HTB-0187 | Penetration Testing Module 187 | Advanced | [
"Windows",
"Reverse Engineering",
"Exploitation"
] | [
"Objective 1: Lh9ulexesRP2St4mqkka",
"Objective 2: tgppW7Bw3GzpCfZNLm9w",
"Objective 3: BOVFv66mzhYEphyqTfxp",
"Objective 4: 9uWdXDB3zxj8RbVnfo1d",
"Objective 5: CIpccc6XwMGtnYcU1V8d"
] | {
"os": "Kali Linux",
"tools": [
"wireshark",
"nmap",
"hydra",
"sqlmap",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: zITJgxLIk3jriiRfd06QDv9ogG9Yax6bzQusvmKEuQEQLRPXBmLvKEYKCWBTIIx8Oz840uBgdHvpyDvvOjspRkHsGbQXxwRBXag1IxdvIoQJuL4B1vwVolTVCcIIuL1BKxYoGW7dbKXW08zrjCOaoV",
"expected_output": "Expected output 1: VXUtaC1MChb19TnqVB4QQ21bzqXVxW",
"explanation": "Explanation 1: vl7... |
HTB-0188 | Penetration Testing Module 188 | Advanced | [
"Windows",
"Web",
"Scripting"
] | [
"Objective 1: CGemEsKgD2k8SwHdGWxS",
"Objective 2: 3LW3HtHH27HR8G5VdDBx",
"Objective 3: 4mf7PhupaokQh9CAetZT",
"Objective 4: zTBLiGGmv74VD6sQRRRO",
"Objective 5: EbKKuKHTPTSM7dvT54Hb"
] | {
"os": "Kali Linux",
"tools": [
"john",
"burpsuite",
"wireshark",
"nikto",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: cPq73lmoIsizaH2s1D4bn2Lp587yyk4lcxeBYPvZ5rRAhpIBTDALJ7jJa1MpNt7h2NOHcQz8b2Rj7cOaY6DyFB8AbQowOc9UsqtG8azDxDfNbcvkiek9sgvZJeZCEKGoX9d1qI2UwDDyiI1YqdNoLf",
"expected_output": "Expected output 1: SlBKVnCEnEW5Q70RMsuFP5Phh0GbWy",
"explanation": "Explanation 1: kgD... |
HTB-0189 | Penetration Testing Module 189 | Fundamental | [
"Enumeration",
"Privilege Escalation",
"Windows"
] | [
"Objective 1: Gi2mixcuRJOoimaU4nrT",
"Objective 2: AwVLrH1hOHOkEjPH8aOD",
"Objective 3: KMpN8huwT6MG9A7TgQKF",
"Objective 4: wjCoPWIUDAX5cEnW2Y4u",
"Objective 5: 0sLFLvtd41ACFpElifVh"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"wireshark",
"hydra",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: IFHwtGLhK8iKLM3y6CZu0MVdoXhrXrZSd6FH4A9D1YH4ljd50lUAgfYLM4ougoNWMCiBOvHBgZzIzr9gVZd4sdSiBxeTVNkBOawgu9RtyJJD6Zip9ZNNAQ4Q7rj4TM5imDbPFZWIod7mQNDdDgk3Gf",
"expected_output": "Expected output 1: pZ6dNjTz5JI5tSKkE1MkJAUbrONKIM",
"explanation": "Explanation 1: n0n... |
HTB-0190 | Penetration Testing Module 190 | Fundamental | [
"Linux",
"Reverse Engineering",
"Exploitation"
] | [
"Objective 1: oG2JXmbwCbeL18lkR76N",
"Objective 2: BKCLeRoKjm8tTFY4WOQX",
"Objective 3: UoDRHZ2sJh7qaMJbgywL",
"Objective 4: Rpr2zc77vhLvSljY0zDh",
"Objective 5: iT3yfBTSoQd11xYaTooX"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"sqlmap",
"nmap",
"nikto",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: JaNh6yt66dn6tGO5VypMlwpH9qp8b0Ugzs4msl0w53CrhhYuPDxeaIFPf2Di8nwB9IoIY44DoHP2Odq1lR2XwUzNxj0POazZ5Wm7IipmpX9EOeTbC9UqygQdY2DwiCKFU6qcoTCvOqgKxj5pwfuCD3",
"expected_output": "Expected output 1: fyLA0cohfNUN7E6JEvKHJZuAvwLBUa",
"explanation": "Explanation 1: MfJ... |
HTB-0191 | Penetration Testing Module 191 | Advanced | [
"Enumeration",
"Scripting",
"Windows"
] | [
"Objective 1: evy0g2Lfj8sxKOMBWi3D",
"Objective 2: zzvarDJJICr5A5BO60x4",
"Objective 3: GvuPAvYy2kpScBkUkXb1",
"Objective 4: o2HvkcL6ewbmkjwOhDHh",
"Objective 5: rOZ3akABOlywnsUC6mVp"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"burpsuite",
"wireshark",
"hydra",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ROobDaQmgpJL49N1Yf3uYeAegzUondcuWrdvNLN0uikKGUq6SZSH0tQAZZnWWCwUCn7UIG0jxvhyPVEqmPtj7I7ZQS5DCPTOjY7LDu5TKcACqslUbmPOK6PgHUhyALBd06MQkLq1Qtuvp1wEYpZJ9J",
"expected_output": "Expected output 1: yPl1ObX0W6G05ssdjuUVkMFIyW3mQv",
"explanation": "Explanation 1: cY0... |
HTB-0192 | Penetration Testing Module 192 | Advanced | [
"Windows",
"Scripting",
"Web"
] | [
"Objective 1: LYUTnB7BIeQjtHul6GYS",
"Objective 2: ldM31WfV9vk9TxBDo7IH",
"Objective 3: Hm69lcYug0YIHHtH3lol",
"Objective 4: ZYnpIWfycCWba6gIVVe8",
"Objective 5: ni5uywlx4UDA435oZ6BE"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"hydra",
"sqlmap",
"metasploit",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: oVSTDJiRYqcjCHFajIMBZyjkNk8XjgPjYg8F3P4ojSKd2kdAxodeTWJ7pjhlchCCLm4FKlGmqXE907FWz57Elf8qrdSNypvHr9dTYvjkc4xxY8mq2fSNzGqSQBMgYYEmKL6bYByQekJkm1a1HHJiHs",
"expected_output": "Expected output 1: LUiBdvfk8UDMJhyUzxbRHSd2oxPOYo",
"explanation": "Explanation 1: McN... |
HTB-0193 | Penetration Testing Module 193 | Intermediate | [
"Enumeration",
"Reverse Engineering",
"Linux"
] | [
"Objective 1: wUjqmXdASaHX4eEipMzi",
"Objective 2: P0ThJbQr3ILqubpH7eZp",
"Objective 3: f0UxPBWHrLAIszfN9FpL",
"Objective 4: nR8jTTmWn7e7mJBg4pQ8",
"Objective 5: pdIj1dBapW3Q3zBpYUjU"
] | {
"os": "Windows Server 2019",
"tools": [
"gobuster",
"nmap",
"john",
"wireshark",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: L2PPuKCoEXqkw2qrqedqrmcf0aW6HTS1OcRiXVsOTBsi8xXSKF4It5tA2mdEoOuSDr8YhVU3BcNcJiSX1mOEg9oWJ9PEPmqepoVrnSLIWeLZeh0RGkOOnIGUs1iVKT2mT2KISTJRjtwJw4HhBijtw2",
"expected_output": "Expected output 1: l67f5VlJ4dk9qkY5LFiNZb1gj6emjl",
"explanation": "Explanation 1: BDA... |
HTB-0194 | Penetration Testing Module 194 | Intermediate | [
"Enumeration",
"Web",
"Scripting"
] | [
"Objective 1: qAMb32bOGAJqDUevcaGT",
"Objective 2: AsgqOCZF0hkNDXhgKrg2",
"Objective 3: ydfSDEmlsPb9I2Oj3QHT",
"Objective 4: f9fId4eD5rGvYGdeyv2c",
"Objective 5: IqvVPd8qEp7X9bwGfa0r"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"nikto",
"netcat",
"nmap",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: MKCAtAYZKg9NG6CUimRRitfrLn6lDZ3A8I3TEeIikEMKmIXdWC2zd0GOT3suIDlm7cEkZKh67FKrxfPGNcmNYaAsKxKldrMW4aQcBLuh1ktuLWv6qdzS1ZYUHB6jRymR1TSqKwSR1MHqAka95aLh5p",
"expected_output": "Expected output 1: GhGMLhjNcx3OlJO0nGzV88H2lfMAak",
"explanation": "Explanation 1: BPU... |
HTB-0195 | Penetration Testing Module 195 | Advanced | [
"Reverse Engineering",
"Networking",
"Privilege Escalation"
] | [
"Objective 1: JvotY8r2jlbEzwKB3qpZ",
"Objective 2: MM6pTOjPnHLEQ9W5SmQJ",
"Objective 3: bevLNh1C58ZHoiBZKTPZ",
"Objective 4: XV0qJlRLogyi3iIDKtWy",
"Objective 5: 6yTRz1sgvtI9mLdrIAJL"
] | {
"os": "Windows Server 2019",
"tools": [
"gobuster",
"metasploit",
"john",
"wireshark",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: RhV173Ljw6bQoVbiRZgAi58l3jNFapQ5MnOjFl25c1XQ6OdlyQsNopoWc3bdOhgnevXhpircBHxuU4ylN1hFSqC3ee9KFbRwkte2vtPU8ajwpTKbtDzPXDm6l9V2aeeZ4SW3Wectl9YZi56GjG6ZQP",
"expected_output": "Expected output 1: v7qdEstkcIe6fAguzEh2qAUvDV6INM",
"explanation": "Explanation 1: 5wh... |
HTB-0196 | Penetration Testing Module 196 | Advanced | [
"Windows",
"Networking",
"Scripting"
] | [
"Objective 1: yhthlB3kAk584zkgPFEs",
"Objective 2: 8GyOI3EcGoTri4crjpnE",
"Objective 3: AmKNrYjJN3rV8Wg6wopM",
"Objective 4: EVdnEjk8fg38HsAAWeeA",
"Objective 5: xwGAk3relXXWTubk0h42"
] | {
"os": "Windows Server 2019",
"tools": [
"nmap",
"sqlmap",
"burpsuite",
"john",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 2gNUhlnrJnmdGtKhYEPVo5xCagvGYuwRTFijeXsXV6ebdclNlP9Ak49CM2A7XoRqUpj87YEQS7Tnj1ZnaZGZh7cHQkJKr0RjDS0msLWq4VtmqfG8DQGSHqLKyaXt2bA0VO8ap5mpC0l698jFeBLdzp",
"expected_output": "Expected output 1: GK44dch1G29mHK2WqDB8oqeKiJAOjf",
"explanation": "Explanation 1: UoM... |
HTB-0197 | Penetration Testing Module 197 | Advanced | [
"Scripting",
"Linux",
"Web"
] | [
"Objective 1: XFXtaS8ws79SWU5kqxcj",
"Objective 2: yarrmncj0qAGahfXIZm2",
"Objective 3: RTHAaWormmE5fx334ngX",
"Objective 4: jIfj83WWJo476CobLTgn",
"Objective 5: CzMc1u02YkYUyzaLW9c7"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"netcat",
"metasploit",
"hydra",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 0316TblNUq2rHrdjhGWwMmWFJ7veII8OtT23FdaEegezUPFakmVpaqbdfuS2SHpctcPj3NgDTeCGA0rxwISn2Ista1fx3wsyiMkrnVjUMNZCXUXb3T7jnVWNRV3i1d6WD8TvqbB74RpLZu9YlWFqjc",
"expected_output": "Expected output 1: RCVbWyd1LynVnaVz4DYUk7eQGFlEMs",
"explanation": "Explanation 1: jhb... |
HTB-0198 | Penetration Testing Module 198 | Intermediate | [
"Windows",
"Privilege Escalation",
"Web"
] | [
"Objective 1: EqXl3ZJ9nJQVahCh2yCq",
"Objective 2: dtdS6ckUagVbvEbDYVoS",
"Objective 3: 2kQ7KwpnhRqGC4msCMgx",
"Objective 4: zaMKB7PFplrtImaHF8mW",
"Objective 5: ebPT0ZlssZE8SjEa2oZK"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"john",
"nmap",
"gobuster",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 0i1pONnxvyxb00tdagPnHlCCVqLBnsbO7EGVYxvxmRzi19RpFSSvdvj8hTRjs5eFuaLIFhVDC98IkCl1nFkeOaMarIlQhZUZQK6mKChTTswSCF31yHRVBg81Uml5svBsE9Guga41aj8gNHKEmRi4EF",
"expected_output": "Expected output 1: fV4Gzdisx4IU8dUm9UAIi3Zgd15j1W",
"explanation": "Explanation 1: MF4... |
HTB-0199 | Penetration Testing Module 199 | Fundamental | [
"Linux",
"Exploitation",
"Privilege Escalation"
] | [
"Objective 1: EdWVeqQiJTLPwZX88dBP",
"Objective 2: 92IsQHMKnjOcWe7YByLq",
"Objective 3: JfQWYOS26pkDydnuN2Sx",
"Objective 4: wgupSdO0qVzGpHJvG3MS",
"Objective 5: vvgjXWttpa9zsAalFB9v"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"netcat",
"gobuster",
"nmap",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Z4ClrUYRIxj4Qxl5Nvm9zkWPbJ8kpAiKrV0OIOZCFfQ2CnPVSVihzVjkAAoWKTLfJizhB66f8gLD1DmuMdnKZxDEXO493okxi4hm1xtv1ZkyfJPpPrqRhy1uQxVY3mghjGaNRAoiPHH13Auaz8T3JR",
"expected_output": "Expected output 1: VY0lddOEUnj0DHtJCAaJpDTcw9IUOf",
"explanation": "Explanation 1: ccF... |
HTB-0200 | Penetration Testing Module 200 | Advanced | [
"Networking",
"Privilege Escalation",
"Linux"
] | [
"Objective 1: k0JmSHdHg7q0ToDMQVNc",
"Objective 2: K57e2T6DVLkrjCWaHlup",
"Objective 3: rdCv2HSEOWvtxgeNBnxE",
"Objective 4: foMjdzQ2TqN6xuJr5KUD",
"Objective 5: VSvztgVW0FgoOJkzkgYH"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"hydra",
"sqlmap",
"netcat",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: UVSkxQuZoN6pzwI3TFmWheZ703KiqbpUqjX4EdCudENXIU7ykulecrISeiuo7Fm24S6ER0XmaqdU6XCUOYjE2Q5HFZUZp8k6RrrfTZ1f4vsa4cveeQQZ7Wf1RG9HUmo9WSRHmQfjJC3wQZjJffL1QE",
"expected_output": "Expected output 1: BzoeIB39FqJUuI5Su73Uxv1lPbNFn9",
"explanation": "Explanation 1: ZCV... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.