module_id
string
title
string
difficulty
string
tags
list
objectives
list
environment
dict
tasks
list
HTB-0101
Penetration Testing Module 101
Fundamental
[ "Enumeration", "Scripting", "Linux" ]
[ "Objective 1: XoGOMvycxW92BfUR3bip", "Objective 2: Y5BNb6gWaKEMRqFloMBX", "Objective 3: SHmYYtCQUEAQPnSKSeie", "Objective 4: dlKKIUDfnDddy3w6kLBE", "Objective 5: ldRgzuslsNm2ZEioFK9A" ]
{ "os": "Windows Server 2019", "tools": [ "hydra", "nikto", "wireshark", "nmap", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: yPW2O2RnMwNuoH4vJcoxbjNgLSiYEPr8DguqYVk5YB2b7L2Kx6hXsrxjFGlwr5H8nOa7jk8ELxDLYkwe2QnG2qHQj3BsNhqxQsC7u8SvfbNho71iPSgUP3k3ZagRWa0fda4IY94ET79QS45CWaLUy2", "expected_output": "Expected output 1: jcb4HycCYd1h3Pal3Yyd3HldjcbFsk", "explanation": "Explanation 1: 2C1...
HTB-0102
Penetration Testing Module 102
Intermediate
[ "Windows", "Privilege Escalation", "Networking" ]
[ "Objective 1: 9XBXJuS0XJLCokGXDLID", "Objective 2: hrAypLOVaxTMh4urY2JN", "Objective 3: R6GnjtAwVLH7QoXerdai", "Objective 4: Vu7EePLO3PaI27rrxe3w", "Objective 5: FbVA9r7AWtyWYwc7S2HY" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "wireshark", "nikto", "metasploit", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: u5ERxrzWoWgVC5RaFH2FypvZZJiuy6lab4L7u2MhTcBNQ81az7SPycoaRcMgH76QSVP2g3EBIk0NuhGpyedfSDXrgxaRETjHrBwiMr0M2JGPLD5PjfPJ8phZxzfZCEsa4edjEXSW1T4dQzP3zPRkbz", "expected_output": "Expected output 1: rxTDMShYaZZJhuZGkqRBPXBm02BshM", "explanation": "Explanation 1: DQf...
HTB-0103
Penetration Testing Module 103
Intermediate
[ "Web", "Privilege Escalation", "Enumeration" ]
[ "Objective 1: uSF25tbznuwsjF0KdJno", "Objective 2: pspTMqgXVJhCRxmKcXCR", "Objective 3: w3SLGOsk6l1kEgIVBGOf", "Objective 4: itm4Y3YzTXFe3Xvoopdw", "Objective 5: nWvo2KLjwP4wJwoREtz3" ]
{ "os": "Kali Linux", "tools": [ "netcat", "metasploit", "wireshark", "gobuster", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 1n1ks5QdFBWHTrB4HPr3YG1CTfI7p5hrEN4jg9PPJUatJpYlY13A3rdij8ZHJF6g6giuPj8DnKvW5H2ucrAmcJ33FekOQ6vrE2oUudiGHaRy0lB0lvgmPsFs4aYaSyykIqeCZ1ApRZfX8WaLJOwTd5", "expected_output": "Expected output 1: A6VNvkTd1tFF2QNmf0mIMd5FBUFOym", "explanation": "Explanation 1: PhH...
HTB-0104
Penetration Testing Module 104
Fundamental
[ "Enumeration", "Reverse Engineering", "Linux" ]
[ "Objective 1: HkdnNRem2eJYcJoxQiTM", "Objective 2: 3svFh7gibDacwXCgbDgE", "Objective 3: 4wXpy24c8GxSl1BZVIwv", "Objective 4: H3siyYCATALV0V2aSNyb", "Objective 5: aDGsQ4HRwQp87WMYb6ju" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "john", "gobuster", "metasploit", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: xAG0KoL2ZJnYObk3oR1Fo4HUsz8VxFI60LD7ATkLMwevT0wvWv1iXtDR52QPJDHpS5o2gRGLvWsSRL3rL9RJLSHunyM3OXaArXcy7HqZpcakl76q7EW3EqPl8p687poY9K8iIWkR5GqWPfgvwx7gGk", "expected_output": "Expected output 1: 57t0DtNgSFj2I6G2qnkAIYLlSO63KU", "explanation": "Explanation 1: Zfp...
HTB-0105
Penetration Testing Module 105
Intermediate
[ "Linux", "Windows", "Scripting" ]
[ "Objective 1: JtZ9l8z8zw1HqUj3hu8N", "Objective 2: R9U4WceFXrIC54tbOsp3", "Objective 3: wmxvdIWAWXukdGD5ehi7", "Objective 4: 7bbuPC1sUHHxCq0nzb83", "Objective 5: ApIg9IDNNaTdQjIW5RMG" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "nmap", "metasploit", "gobuster", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: s9ALknL6j9F1JwIEcrcX0xINDwsKdPAYV4xnGa6K4VXCru93ghHKbnaha2cjxgxXX1JVK52iqX56fAizRNssqjCvXMcUgLfqXJ78pYvK91bbzbYnmpmfSYm7rxtYe94tmzOimlzsvXGVMZYdXgC4Z4", "expected_output": "Expected output 1: camakzH2WND1CQszGyLi7uWo3by4f2", "explanation": "Explanation 1: 4dW...
HTB-0106
Penetration Testing Module 106
Advanced
[ "Scripting", "Reverse Engineering", "Windows" ]
[ "Objective 1: WdhziLrIpm33WioTBv73", "Objective 2: nJQSJW2BOdP146bS0jvk", "Objective 3: X9siB2NPrhWGdR7FQxr5", "Objective 4: okCfTNg1dF5wB9ggk0AG", "Objective 5: Fqg0nAGpXwCOtbAAoJnB" ]
{ "os": "Kali Linux", "tools": [ "nikto", "netcat", "gobuster", "wireshark", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: gr4jLQUoTZ7m0GbZWoiDZjgTDtdNaH3rJD9V0ZZus3NAxGJRTsRcbzZmrduWHceL7B934MKLRvNjTRMuSCh2SJ0bOdlhoQRSEPe0yL0cqVAh5Lz5bipZEQnwJAMivmlWpb8jn3OWKqMZyKIAdzq0Aj", "expected_output": "Expected output 1: EXZhKBnx2eR7P7rjTTGe7mqJpE5J65", "explanation": "Explanation 1: fOZ...
HTB-0107
Penetration Testing Module 107
Intermediate
[ "Enumeration", "Privilege Escalation", "Web" ]
[ "Objective 1: sPw6Upg64X2ps8dBbn6o", "Objective 2: cfT0H1pZvZjMx93fMFGB", "Objective 3: lbgrvnLxfr5bn8keHAkh", "Objective 4: kEQfs8zaQsABQGGDEjbl", "Objective 5: wnb9Xqe52UPuZLKvp5jC" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "john", "netcat", "hydra", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: Z8OL2dqsTdaEMyLZE5zq0pVwL5wZg0hJS5w5TZCI9zTTGyBCWfA4T8ubb8kuwJ0QUl5DPIeoLU6ZYyIbxOr2b4LSxqd5XrzHcVdmue3EnmaFdjC8dnl0cfBVjlvNFPCdmVfLQv26o1wO7RrxF8Mews", "expected_output": "Expected output 1: ELoeRn6GVPf3rSEvvrC9eq7LxrSe2t", "explanation": "Explanation 1: rTs...
HTB-0108
Penetration Testing Module 108
Intermediate
[ "Linux", "Exploitation", "Web" ]
[ "Objective 1: LJSP71tUbuTRVJosOKOQ", "Objective 2: Kbt7E6ow1XUBO56iucCz", "Objective 3: Yp70ZlHphafrTM60zPez", "Objective 4: 9W554RsLUb4V9WrHXYFi", "Objective 5: 7h8J38RlNOMzAJZNTIZX" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "nmap", "metasploit", "netcat", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: 8x1vTYdoafNy7oF9CKQsDbVTjvSicQoUsXF6Aw4z0P3WLn1o47XO672B3sOTHr0PBa9EGxTv41LLdw2kY0kqcTfds3sV8SJSJPNeNO2arhNhNZ7BjaRQGLSmFEKZGvagxxKo3iigrfku5fag00xtdj", "expected_output": "Expected output 1: 0gvYv1bjyqIFi44ydbvU5DpCUCAuMV", "explanation": "Explanation 1: xES...
HTB-0109
Penetration Testing Module 109
Advanced
[ "Enumeration", "Exploitation", "Windows" ]
[ "Objective 1: xul3YzEGeARZtmwBoOLu", "Objective 2: uLeIjM1A8aCh5eLeR08I", "Objective 3: CnIawHWPKDR6MpyzkEYP", "Objective 4: w8wfgEbv9lecy1eGNNst", "Objective 5: NZEcYJm3oj2H2ZT5zo8A" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "sqlmap", "netcat", "nmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: hTsxxDCZcEjTiRf4tbM84wylDcu9nhPEZclqNuvbohTWfMqePm9rrnWtoDWMqGP2ELWHwu9Wc7GZpP9dnTfOrhn87Z1mxSQZLkBPQAV6tRUufZe1guCnN6kldhSRq6LNO4XSmlOoux7GvBsm8hKF7U", "expected_output": "Expected output 1: BIaKdfo0ZiqTnW3AUlOriVoarjSFgV", "explanation": "Explanation 1: uv9...
HTB-0110
Penetration Testing Module 110
Fundamental
[ "Reverse Engineering", "Windows", "Enumeration" ]
[ "Objective 1: PixWhtfLtgcXOF1lPqoh", "Objective 2: ELGblgbBbJhYaJFP4qjc", "Objective 3: rvW4TOd6c3nvb3hGmTR1", "Objective 4: agaxjXwQkBp38DO67owQ", "Objective 5: pWce3TUd0aWmAMoLzxlj" ]
{ "os": "Kali Linux", "tools": [ "nmap", "netcat", "burpsuite", "hydra", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: T5TIHNgenLrMr5wL3krJSvFG7pRMHP4Hc9hLyfoGPJAtkB7q4432xa3sHsbR4dJfMrlB8lE6ouVYHkW3KIAMTTcYO6NhoSHSVtETqJ5btZqHaXwGbAM815xeg6m4MFQniURJm0Lm0QfC4uCWvue4tc", "expected_output": "Expected output 1: crApgzG8RBDEYOPweeNQTbbiQVjd4F", "explanation": "Explanation 1: 3aS...
HTB-0111
Penetration Testing Module 111
Fundamental
[ "Enumeration", "Linux", "Scripting" ]
[ "Objective 1: MpMtdNKSyJDxTkLhxWtd", "Objective 2: 4JgDBPoU6OwO4Jjujm2O", "Objective 3: hK7mAtggBggXJy1jEwp5", "Objective 4: Q9sBAo18rXR6gXiAwOSY", "Objective 5: biuBhvtfliLSkM8dIjG2" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "burpsuite", "nmap", "hydra", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: TfVzt2fv1tgdV9R9itDaIrOc9HqEULmAr5ARkEMEYRpx9ewzIIUSMLYqD47D378RL5Gmwx2FQYEjGCCNINk2jkVeIe6oFNf5TVPpRouF61WSPCMOiItNGA1r2ncm6kjdE3tlLtY26PQ8ntFfDVsuL3", "expected_output": "Expected output 1: rhS01ozwJ4krOLLZeAoFOGSuMz3Y2T", "explanation": "Explanation 1: IkI...
HTB-0112
Penetration Testing Module 112
Advanced
[ "Windows", "Reverse Engineering", "Scripting" ]
[ "Objective 1: Vnq12Umcm3APbjzo7quY", "Objective 2: SRyKI19FN9ywUyPMcBG5", "Objective 3: VqZ025UEdxC6aTlrcUFQ", "Objective 4: cNFQYsKXLJEF941pTh3q", "Objective 5: GlqvhWu2TiqRCraAcGO6" ]
{ "os": "Windows Server 2019", "tools": [ "john", "wireshark", "nmap", "gobuster", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: U6dezT8egOUdQ88bXniatVrERZ2jBTFkYB2glD2s7j8c3uTm87wcGcE23orswaRYMHehxWzolDrBEk8N4DV20noEi3YeDcyQXE8QNgP9kPJF7w9uoiYquwnf7nriRT8vlJkkiXaPVxkgQ94xeIvW2R", "expected_output": "Expected output 1: jNpADBzaaYU9oB8My8DO87gDlDVYsS", "explanation": "Explanation 1: mh3...
HTB-0113
Penetration Testing Module 113
Advanced
[ "Exploitation", "Windows", "Reverse Engineering" ]
[ "Objective 1: AEGf7f8ZtP5RJMXnVD5y", "Objective 2: tyJXWMXU1B82JXk78bLv", "Objective 3: QBpF813hvDMllflv4wkq", "Objective 4: rfD1loh71NK2AC0NZ9Gw", "Objective 5: CukctkT1MIbkvQQPtgYO" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "sqlmap", "wireshark", "nmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: g0fOI0C3sKEnCvuCtMJS2pQAJ0m4f5oeb7B0iKWJgJJDarmORFHAdL2zQebtn0G0NyptGHyso5rUt1pjGYJwPRXfniFQ4N90mpOXdxwVPUqGt5AMlFtbmSXoCH3nzYhXFbdKLETdxB1Cy7VmdUbv9w", "expected_output": "Expected output 1: mSsPlSokt8bf1TUVKSB8MBUIaF4FhC", "explanation": "Explanation 1: OG3...
HTB-0114
Penetration Testing Module 114
Advanced
[ "Privilege Escalation", "Web", "Scripting" ]
[ "Objective 1: E8JI8gXpVUb58LpDDtUL", "Objective 2: txLdAwQGBlnAJC26a8wA", "Objective 3: aQ00lS1HhwwRwCtijRSM", "Objective 4: P3y11yrLFfUGNYkG5Uh0", "Objective 5: m5V5ChxGE1dxbLLJMi1T" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "john", "nikto", "nmap", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: fOyU8osGlfGWCbxGe6lKZ7HOAhWKu9uga33rWRxm8evWrsuv30F7N4KZDEqIane1hidkO7xbF9lw8XAMS33zSZyrxkHqt32NHJVMmW2SFMt3tl0Y2ZJDjrXa27aBB3xOXSZ1KuvHB8KQfAjtkmeEf0", "expected_output": "Expected output 1: SaQwkfQtHiSgWiZzh3tXwLANkfn80O", "explanation": "Explanation 1: mSR...
HTB-0115
Penetration Testing Module 115
Fundamental
[ "Linux", "Scripting", "Networking" ]
[ "Objective 1: Ez7DgNDJAKOMHs1gpO0F", "Objective 2: qFlhb5dkKF1ZkGRmfW0n", "Objective 3: g9R9biAYlP3Hft8wkfAl", "Objective 4: OwpFPGcmRcAmcaYnZgcq", "Objective 5: wxlbMMS854FLDo1BxiP1" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "metasploit", "john", "wireshark", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: DmDpXO594casJSuYIF66FibRFc9Ch2TwnPUyv5d90ExOx1EadfpVIUIMjwLhSbaWBgQoG8Z0XPgyFX6m2WY8uX7ti19xiJ50cRIGxEDKYqtllVML6Ckuh7arzXwLIcAvTqRutxgqMKbJW9vZYrz4HZ", "expected_output": "Expected output 1: 7WdLdDknejX3NsPQ6hlz0I825IHBUC", "explanation": "Explanation 1: WUa...
HTB-0116
Penetration Testing Module 116
Advanced
[ "Reverse Engineering", "Privilege Escalation", "Linux" ]
[ "Objective 1: mXCo54FkzPzf5oP3ed6k", "Objective 2: XpCputieaB8r0LtgKibC", "Objective 3: HDedbAvQpzxiTKo7m8r6", "Objective 4: yRdA7vBq8gXN6JcSmyEh", "Objective 5: hPn0sbiKXnY0c8g0uqKm" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "john", "sqlmap", "nikto", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: IHrvxgLmxZEwtmcCEY78AG8OxqkGmIpwNACyxWCc6C2yYc6VPOcU4tub73wLr1yYtpfHt2mUqiCRNdlYhT4bmZqMo7OTNpKj85RacQmB9dICk5gHGnGaTMAF6MOwPZomhGSuosSxMUl2wJJEjbWfFt", "expected_output": "Expected output 1: 0tjL1ynFgldJqrd90dTRnmhfbLCu7m", "explanation": "Explanation 1: LQT...
HTB-0117
Penetration Testing Module 117
Advanced
[ "Reverse Engineering", "Scripting", "Linux" ]
[ "Objective 1: oaKHB9UcgqlDtRb3h60y", "Objective 2: u5UpHJuyaekDw9vZRqSv", "Objective 3: CWYWnE7owxBhcPhoa4KO", "Objective 4: Hw9GpNXbl1PmD1pDs9oX", "Objective 5: yTd6Gl725fF3bWORlO2X" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "nmap", "wireshark", "metasploit", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: ZrFuRGUSPRDGIEIHLb54MNCrAIocCptBdsKVpD2u7jNPdcbCH05bsWniUCW1KCohNdDf8r8wTVfnA9KQhsSYA68t6BZg4fZRFaYMqjFfrOgAnWMmJ7CLy1BoOMlFOhVXQEvrS7LE9PmJZqv3uchDh4", "expected_output": "Expected output 1: eYOipmk2eV3VQwx0e64ybWzaG420D0", "explanation": "Explanation 1: maX...
HTB-0118
Penetration Testing Module 118
Intermediate
[ "Privilege Escalation", "Scripting", "Web" ]
[ "Objective 1: lRMY9yiITGQp98n0mW7o", "Objective 2: 01ImDOh0eREtXqmxWgk0", "Objective 3: vmAKXLAyayo0Cniqr5oM", "Objective 4: s0haYQA4wzTwdEJ4X34P", "Objective 5: 9v1DL1m88Ue4gk3JEtTC" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "netcat", "wireshark", "nikto", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: w9dCoyWYqwv5c7NyHCVHjBAgmpFPixeA6Uq3f9gqbhL2Lrjh3Ti7C9vSV7wfL2uZF67yogn1BfR5t6uDSZ0BkdBI7VuIZ9uY6zYdqRZR1zFUEbsVWfFgCT6PHlfUbkpFSfmQhd8MbRxcyQbRNTAaZ2", "expected_output": "Expected output 1: EcFoKeNrWl6mNj6JTh2OHFs66DPkUp", "explanation": "Explanation 1: ncp...
HTB-0119
Penetration Testing Module 119
Fundamental
[ "Reverse Engineering", "Privilege Escalation", "Web" ]
[ "Objective 1: pKSTxp7lqDvgygLmB5kL", "Objective 2: oUNOBmqqUuUACQvaYSWP", "Objective 3: YFLD9p8xjhT7uaYyEKoo", "Objective 4: 1lyF6yBN1mAPsrmCtIiV", "Objective 5: LH5osGrWdlRuGE9ujJFJ" ]
{ "os": "Ubuntu 20.04", "tools": [ "sqlmap", "burpsuite", "netcat", "gobuster", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: q55yyo8ANDXNNQmDxSbEHUn1KzlyStBOUgi3c4v9EaKikktpw0TF2UtY5DDYD35dB4FLCnOrNRD0gMvXGncTgBiyzdHDEIyL3OUO64OBb7Pc73zQlPifn516XgXKC7BSWiyLjwY1rS8gvzwMzwV7Hg", "expected_output": "Expected output 1: oDgtFWKqGWDTkpJHhnFuFeihPEA7ak", "explanation": "Explanation 1: wUQ...
HTB-0120
Penetration Testing Module 120
Fundamental
[ "Reverse Engineering", "Exploitation", "Windows" ]
[ "Objective 1: eYSWw4WVrMWGoJ6BO5kg", "Objective 2: RNMz6H08ovJMqO1Sx8Nu", "Objective 3: 6Y6DAbsTyTbXPgFLcTti", "Objective 4: PTe6U9NQiJYEH46Vo5Co", "Objective 5: 5WjAPNZGVFhmaj5InjnJ" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "metasploit", "nikto", "gobuster", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: KvUFHPOUc9GLPSX3PWNoy2Uspi5VIEOagCVh5YOMZBxqIP3WqQxeLJeFGN4PsHqfGfqg8Gg6jsLq4kZ5q4SEecYRKzHty1ZlKSGgBVRXERry7kvAXUeeAwnjvh2ND5rFlL8BvoxENAxBDYEjERmkmC", "expected_output": "Expected output 1: 7xDIbMIKgfXAzJypCbFWfR9vyFFcOJ", "explanation": "Explanation 1: fOe...
HTB-0121
Penetration Testing Module 121
Fundamental
[ "Linux", "Enumeration", "Windows" ]
[ "Objective 1: 7jm2lDdtsHK8t03K0LH8", "Objective 2: DZ9U9ntUSvBdNFI98z4t", "Objective 3: Jzkp5Yq6eEIwbPnmVh8k", "Objective 4: 1pAE66A29GLwpGBb81mi", "Objective 5: 7kp5r4OkLs6bNRKZJBWJ" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "john", "burpsuite", "sqlmap", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: TrPblvm3sIk7WQ1qaNOQD7AFhGdHBCCCAI6J5HQM5rZH39FNc95UKxt8QzXpPb36jDrmZegAP73CrbciHySZDMM9x2ICXrvIMAYmVECDoAfsxG7msY4tzb6xgzkzbHqcZQUWt3qYXB9MfhkSPIgAur", "expected_output": "Expected output 1: tFjq7PwiIrRX2bFRnTdbrRPwpvTZ3z", "explanation": "Explanation 1: 4nR...
HTB-0122
Penetration Testing Module 122
Advanced
[ "Reverse Engineering", "Enumeration", "Exploitation" ]
[ "Objective 1: Rk7Kqo6Ta5atYW6M6x7b", "Objective 2: fuY1oFqSE3BRbsYDt87S", "Objective 3: F50eEJ0oNTlaXoG5gBqk", "Objective 4: dNlG3zxnaTUTgTLvgiKP", "Objective 5: Q7XNFIBtK2CISNz7nAd5" ]
{ "os": "Windows Server 2019", "tools": [ "gobuster", "nikto", "nmap", "netcat", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: vCapcNyDe2YT3rs5Qk7pPIHgkXfWxWZsZav7C17OmTpVpzuDdmGV9fJgzYeYmv9stuqaZQ8rQafuT5JeoIvOkiQ1NClhtqwcUkZtWgEaPxmWHV3D1XY4HbV6JGkgDAdB5XgoBULIwzzy57nO3CxPHt", "expected_output": "Expected output 1: OvQmNi7B329VRaFom71gwP1OJ4Fep1", "explanation": "Explanation 1: Oqw...
HTB-0123
Penetration Testing Module 123
Intermediate
[ "Windows", "Privilege Escalation", "Web" ]
[ "Objective 1: 8mruvNEDmAemR6zpiIVm", "Objective 2: y1e2h07VGNBYh9Qp6qvG", "Objective 3: OMGwXVihs3EKwVv4M4BE", "Objective 4: I1irGHnlcSS7JBI6TALy", "Objective 5: QDr5qTKWuoe0UjzZ7oQ0" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "gobuster", "nikto", "sqlmap", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: einpOzXA00dRGpT3e7jlFccQLGqpJNAsUdofTSeCWUtIfZjhlHgXr2396Tzbanwk4GIviD02aurskkZRIPmDmwlji2TL0Afc0oBX0A8PLXv7aHLPb87M0oV1INncLyR6s6sbu1wrBmtUSJUVuR6Wkc", "expected_output": "Expected output 1: eIgScto05tGpuGUrAM13VzkQfQrKHe", "explanation": "Explanation 1: mCS...
HTB-0124
Penetration Testing Module 124
Advanced
[ "Reverse Engineering", "Enumeration", "Networking" ]
[ "Objective 1: 2jbv0B1kswhSmjq2h5GK", "Objective 2: b4kjxCd0VZKdU6Hx5yLG", "Objective 3: Sc8iYCwt3N4LIAYe8Q5j", "Objective 4: SIj7ScS0hgtwP7gkoT71", "Objective 5: 7xNgw2DRgZb2aMNqYtFH" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "sqlmap", "netcat", "nmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: c6VXUCk3ajc398DuUtJzedAJvqcvz4fhINYWXRNt6cp8jiyKS1U6ylFeQoy32j1hQMA057GJHxH5VjqNjw9pZ5DoK8mZWhi0Bqe2r0HzJgI9vkiPbyy7VF79ZlCI6OB7dt9M8mPLWkUjdBARnvkAh0", "expected_output": "Expected output 1: WJhpK5H7Ap5bhcLao7Mwn1fxPaKIrx", "explanation": "Explanation 1: wvg...
HTB-0125
Penetration Testing Module 125
Intermediate
[ "Windows", "Reverse Engineering", "Scripting" ]
[ "Objective 1: Pxhk9cKi7soN8fG7Fivt", "Objective 2: YyEmFxNu6iuXov8tDz1f", "Objective 3: 2KSBjtVtjH3dctUFwQoc", "Objective 4: EzY4CpShkQyqDf2iZPh9", "Objective 5: lWs6Z5INDOH2NA5jGAeT" ]
{ "os": "Ubuntu 20.04", "tools": [ "sqlmap", "burpsuite", "wireshark", "nmap", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: 0DaL9EVNNzbepdeLE0uuHatvC8zMpggWjUbvaspYBOWrHP8CXzpGg7PoRAfb2nIXLAlDxzsSb3PfFFwparPGgiEUEEgRL4pTDVTH46Fi66Ceow20TnoDhzhgVNRlTclzT1bG2AYZoIWfcUlrtXMKuH", "expected_output": "Expected output 1: cNqLZjaABXKV5TRxz7nbiz0cD86Dxx", "explanation": "Explanation 1: Pgn...
HTB-0126
Penetration Testing Module 126
Intermediate
[ "Privilege Escalation", "Exploitation", "Web" ]
[ "Objective 1: 4QVaYTny8vknIa7YkQo2", "Objective 2: mTvaRqUaSBcP8YGrSoOq", "Objective 3: 33eEZmsgq5Rnan4ECMC3", "Objective 4: Jwu1JqsF2MZhsj8ucfZB", "Objective 5: jHg1rBafCwlgejauWRx9" ]
{ "os": "Kali Linux", "tools": [ "hydra", "netcat", "metasploit", "wireshark", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: Jr0En2aRT4ZV7EWNNjxzgKDyuJDoitTChRBkoEIFe4FTZ8Zhj1mKcGBbSnFqn4ral8gOb5v11mlC9vwXvEdHWxBFoKKYcZko8PvJkxmOMDoEWJL66JP29jzZR2FExJBjldTHzcqkZ1v7gsdmFYIx6O", "expected_output": "Expected output 1: zxxLBTXqNpfssK3e2hlEcEASZpkUrL", "explanation": "Explanation 1: RAP...
HTB-0127
Penetration Testing Module 127
Advanced
[ "Privilege Escalation", "Web", "Networking" ]
[ "Objective 1: zWoF3NRv7syhvk9mpQRA", "Objective 2: RkcdoEwkRXYbucwByGHT", "Objective 3: IO4Q7CpxiN4hL48vljQj", "Objective 4: KN8odGmv6FMABkClNgEI", "Objective 5: N3rc15uQTbHuKWkdr3eZ" ]
{ "os": "Kali Linux", "tools": [ "nikto", "burpsuite", "hydra", "nmap", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: g5VTqG7ff6kuukWf1JOv6H9HHqJ2zZ2Xv3URG3cJTzyjdEfml5I9oJrLpSkHjgwj0DZUQaOUdQCIoETE4uPGCgnTlNJE6iFbZcXYB3MGDJ0dz27TlNlOZeZ7n7MhPZQ6ehpaHXk6AhkKZW9LJZFF7g", "expected_output": "Expected output 1: M5skneRWXwRn4GAlvtZjnduE0AyovZ", "explanation": "Explanation 1: MpP...
HTB-0128
Penetration Testing Module 128
Advanced
[ "Reverse Engineering", "Web", "Exploitation" ]
[ "Objective 1: Swli9zSgXugSqMzf4zyF", "Objective 2: 4nBjV0tVMFvW5KxrUfgu", "Objective 3: n2DsDRGjWEC0l3aVP3Jh", "Objective 4: 9CS0Rtw5M6pAT7TvAzQw", "Objective 5: ltRZTS2Uns71XGZyDSE9" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "netcat", "nikto", "hydra", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: hJ9b4JEz4sdPlZ47GezofoQw290CiA1qH1NrHhj5Fu0V264K5i7p19OcwFkssz1iyQIjZOPK827zsa3zAEzzf2AIil65RS910W1lWuKofVNuUft2cJP9D6k57rmxJK2AEDz3AwCosqKz0FTLKsFCYC", "expected_output": "Expected output 1: EZwfvDID7bpeAaYsr1WWywHTUrFOLR", "explanation": "Explanation 1: 11g...
HTB-0129
Penetration Testing Module 129
Intermediate
[ "Privilege Escalation", "Web", "Networking" ]
[ "Objective 1: p6bPi9Owl2pZA490uRVv", "Objective 2: 1cUZiV1ybtxLQi97vTWW", "Objective 3: bV4UdZeO6f9JWR71VJhn", "Objective 4: dkXOXobH3CjfYUSMXxjf", "Objective 5: YYnAsSwb5t613AabvDNY" ]
{ "os": "Windows Server 2019", "tools": [ "sqlmap", "metasploit", "hydra", "nmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: G6krxRSpJI6AskOZQjmJirYElwoYVtRjm32mg0cNOGZIiAjuAaVDJTwGV2Be5WvBX04GJjhfBOecKfm0PSXL8cZNV3p2jNB57mXdDIsYWeO6vNBKAkE8sA0SkSxoJE16rxhi5lbG8rezJz1skRGuaA", "expected_output": "Expected output 1: hEHOgbxFUTOZk3eW77cYGfzbXuKCLL", "explanation": "Explanation 1: 6TE...
HTB-0130
Penetration Testing Module 130
Fundamental
[ "Windows", "Networking", "Exploitation" ]
[ "Objective 1: mBskDnz4QpYX5MBu4blX", "Objective 2: sc9OTrtZhFAJgZcHwXjc", "Objective 3: oVGQZNKkxvo5cWy6cxL3", "Objective 4: eXO97tkaPTFIsfNy1U3j", "Objective 5: kGSvObiMKHkEhrXPNzTU" ]
{ "os": "Kali Linux", "tools": [ "nmap", "hydra", "gobuster", "wireshark", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: XZf5DsoDBnaiXF2MBTX3WilxrcyQKswdU1MT7avTk0FTYoC8F7g8GHrFcWhiIrSsB9F15uYVgtpYjKa6pB7oika3am5guJMfy2kEDop9Z2M4IF6XhGYYXCDbtK9gp9Xso846GzsAHOsxFTJX6NNK4E", "expected_output": "Expected output 1: fuuqkxLju7gXR3rc0TkCoaIDlAmROu", "explanation": "Explanation 1: i4A...
HTB-0131
Penetration Testing Module 131
Fundamental
[ "Web", "Windows", "Exploitation" ]
[ "Objective 1: lufj6HQenT2nvOiEVlHY", "Objective 2: ve0isZFwcRpg4j10sxl5", "Objective 3: pegbn4tkV9sSzv7dF83R", "Objective 4: QbOdS8WGmRQyySHnbOaI", "Objective 5: KFJEB1eE4kGIAN0fe1nQ" ]
{ "os": "Windows Server 2019", "tools": [ "metasploit", "wireshark", "gobuster", "john", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 1B4phHMyL7lokjLt9GROneXo1ydOsXSnnTpZgFIF4ahTuDCS9Rcuomh0dwhbu0Wq8VdqczJfcWWxkhi3Clnt23IejWCVS7Jllpgmk8fPbByZxqtmetMKEXS0GneOQvvAPZDdImhjqbZ0SWnCTuIDuM", "expected_output": "Expected output 1: 5lQttI2yiPHBKQcB9XoSMtMtUvqEHd", "explanation": "Explanation 1: 0y8...
HTB-0132
Penetration Testing Module 132
Advanced
[ "Privilege Escalation", "Windows", "Exploitation" ]
[ "Objective 1: jXkv6ZhADAH9BfB9DWAM", "Objective 2: 4y0dnQPDi40H8u4HSxOR", "Objective 3: CAHFn5OvU0dZFkq08FVh", "Objective 4: JpHqsEivA8RT53umSuRI", "Objective 5: RDaTjkvFmffkJzzquCCb" ]
{ "os": "Kali Linux", "tools": [ "nikto", "burpsuite", "hydra", "wireshark", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: hwl4zGHRVezFEbtzLUZQS88m7pkONuB0jptC9O5dVbqXPtOs7rEnctHTL2BR3dhycj3r35FfrwJ7DRytnnM5gEwFt7QxsfAb8aDvnSFBGHb4tBph0tbhiwPWqUF1pgxIbbKw3h1J0FUAyH7GG05pV8", "expected_output": "Expected output 1: qjBP8RIKrYDjHWQ8grb6Om4rsUCTfP", "explanation": "Explanation 1: 9O4...
HTB-0133
Penetration Testing Module 133
Intermediate
[ "Exploitation", "Networking", "Linux" ]
[ "Objective 1: OxHLPElolhrvbbUHkQ3h", "Objective 2: ekK1oXyvlfxYieavcKc5", "Objective 3: ULrWmFmYIOOrw1StZJZg", "Objective 4: VnxiHwKb0fBoiDqcaOg2", "Objective 5: MlNZyB5WvRY7cXodZ6yi" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "netcat", "john", "burpsuite", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: kCEtQPZQ9OKroMHuZ00MlPm0vjoeXTUMluV13smpBc9w1DoadEgC1zY2D6dkKy3SpiTlYa3ReoLBttxYyk6OfXyltgdaW4o5tXzl9nbL1q7cJ7EUxKOkmwhfZrHNdPO1B9zefgfUNYihHh4pt64ikQ", "expected_output": "Expected output 1: NgGEc2cb6kBf1dn8PvqN0dLSYqJpZ3", "explanation": "Explanation 1: uG1...
HTB-0134
Penetration Testing Module 134
Fundamental
[ "Windows", "Exploitation", "Web" ]
[ "Objective 1: PmeJg32Rmo5XVKpwr0ia", "Objective 2: fHUVeYOWzPyAmYhcteNA", "Objective 3: voo4SHJCOVYA74rLhm9P", "Objective 4: 8ia9ZFwtCD6o1ib4CLze", "Objective 5: L3u9uxLU742tGtvCmOZB" ]
{ "os": "Kali Linux", "tools": [ "wireshark", "gobuster", "john", "burpsuite", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 2crzSSvWlYTzSmTOJYFIwdHTNCvx0imdgi3K9up6vU3IyZF4kgs69GMNM9daMkhKmbPYr9jQU2LGJ3OrylsU7GpiwpXAnSK5f1ZgcENPynRT9I06t0wu7m4853gG5oeEk6vUO2vJIsEbYqKRhqtC2r", "expected_output": "Expected output 1: yhQ84mjz36fY3MiuAFxOxopHHkbnpP", "explanation": "Explanation 1: S5W...
HTB-0135
Penetration Testing Module 135
Intermediate
[ "Exploitation", "Reverse Engineering", "Web" ]
[ "Objective 1: V1ThsSuqIIMbtUGwI7in", "Objective 2: 321Qq8XA4oXZTOxoTdoq", "Objective 3: TCfl6esXI7hmv4IRCV8O", "Objective 4: tdykrk7o0PqBqdnnZMo0", "Objective 5: ieGt7FvtOnIhouKxXeSe" ]
{ "os": "Kali Linux", "tools": [ "sqlmap", "burpsuite", "nikto", "metasploit", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: NolycPoS1qU0iiNgQXsJNqz6fmvsEWgAZWtGHF288tujeEnwEgWYfUtce0IMjScDEB8QT2oNu1km7i0fHMBrZjYgZAUq0DKnZvwfdIXhxoIThVpYSVdwuJ9ndwIYP0YNNiSYX1WJlT4JONjzgT3o5y", "expected_output": "Expected output 1: 8NmO23SGYVMPByOqEAqqwfBH5gNHDb", "explanation": "Explanation 1: DYe...
HTB-0136
Penetration Testing Module 136
Intermediate
[ "Networking", "Linux", "Exploitation" ]
[ "Objective 1: AmbkFnKXJtKwXlODC3LK", "Objective 2: vE7HypkwRYOhqp4ELqE7", "Objective 3: YNSy8k1hicrBGfXIz6XD", "Objective 4: Z70g3Lj00cBt00UP70WM", "Objective 5: BLszmYULWot2oGKdj5Pt" ]
{ "os": "Windows Server 2019", "tools": [ "john", "metasploit", "sqlmap", "nikto", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: vhvGDWq5Xh0tiSGOvR0d54efLnyuBDOo756U0N6jfmvgHYMPPi1QktUlR1E9ZA6fIfeosIejkApvA7vXGbGQhrq8Z3dSfTyPU5N6X4isaCZHtAnWf0eoXrNPGDQgEck3TOqHZPoGyxBzMebe56zhGO", "expected_output": "Expected output 1: jfgDqhhDq821MJjkeWxVtythFNOXNt", "explanation": "Explanation 1: Ntv...
HTB-0137
Penetration Testing Module 137
Fundamental
[ "Web", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: pM6NpGb9zMtOfOslV3DS", "Objective 2: o8VkPbDG0XISoNdV4p1K", "Objective 3: RwlL6aRe8bdikB9wcXfx", "Objective 4: ukZuEz6ixhOhkUchRoHp", "Objective 5: gaZ5Pgg4OvnwhnYKvLUC" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "hydra", "nmap", "john", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: hWizQ2dvC3GhJpsByA0y68shqT7nadfdS2mPe0xhYmVDPi3aMN2gY4UW6GbejQG9dOK9KA7IUCw04a8FXCC0s0iYiskVaQadmhn9iQWcu4Omzrijp4cIuAW47CbzIgMPBy1v4hfSg7APgrFefG7CH5", "expected_output": "Expected output 1: PqwxMZ6p7LQPF9iBP4q6qseyazRi8d", "explanation": "Explanation 1: zLn...
HTB-0138
Penetration Testing Module 138
Advanced
[ "Windows", "Enumeration", "Linux" ]
[ "Objective 1: iFGgGd0OHmWqvkVUMKVU", "Objective 2: g0frX1JmaeG6qpmf8kMi", "Objective 3: ARBt4EToyVXggVcgvEiL", "Objective 4: u4MBNuN4Cio6fC4uQHoP", "Objective 5: T584R81SnJEEsUm06k3d" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "john", "wireshark", "gobuster", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 5bC5biXACQOJ5LuHISNowoxne1IfXjbftmPq2sysVtS91b3gxVZc2R3XvIJplCobRYdINhjnTqv00RKTFBkAIfX1cXb6rhK6UfSpJMtSEG2qZL8UPfcM4H84nvWl0DKR0xa3ZYrSD2RJhaOBHbYMEe", "expected_output": "Expected output 1: aZj1arThRhKOgnT8jvbehqHo4PzoCP", "explanation": "Explanation 1: Hu4...
HTB-0139
Penetration Testing Module 139
Advanced
[ "Linux", "Scripting", "Privilege Escalation" ]
[ "Objective 1: THP0tpZfoQhy9jNdmeYs", "Objective 2: 9iVzFbAWoi4glWlutfHf", "Objective 3: ZiMVq4l1R0BRgB77oFIW", "Objective 4: z6ft7Dm8pSpazahme0wc", "Objective 5: lNkI9vQAq5bcY0izmIkj" ]
{ "os": "Windows Server 2019", "tools": [ "gobuster", "netcat", "burpsuite", "wireshark", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: Lkp19lEmLDdMJOQM2MBsaX7lzZoxfWqONl4CtgbvbVKR3pZ8d7woG7t8MidXj5pJqXvPeb4ey77cNQkmDldYcxPqqHNBMpJUJyLvLtYu68kwk5cjKOwNOwNg16Ze0wucZIX8CzbBVOpbE4uHw7dePo", "expected_output": "Expected output 1: p50atfMVGWz3x2TtoxXu5hkmkqS5WF", "explanation": "Explanation 1: UMo...
HTB-0140
Penetration Testing Module 140
Intermediate
[ "Linux", "Web", "Privilege Escalation" ]
[ "Objective 1: OquHEoHlz73rkhh9vJga", "Objective 2: JlJoY5fkI4QduYtO0jCL", "Objective 3: NWH0NCRwxgH3OPcd1qRs", "Objective 4: 4FAPaSCpbK4ZWf0lM25P", "Objective 5: H93GhA7czK6dGByj9OxC" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "sqlmap", "gobuster", "wireshark", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: zdlSsJ3uSXN8qSRucR6SEZXJFigLArSKted62nAOJuOvgT81efmKoIpZtvgAXJWdg9qHJUvKvv6Q44PgRfBYchTiTzxWzrDyhNWGdX5s0yK8deaSGUvU2nEAkWnJU0N55ThZ0DrFy5sHXmE2XTyhET", "expected_output": "Expected output 1: o2Vbc1s4C9g9xQt3Zc1eduHIJhiEO7", "explanation": "Explanation 1: 2jC...
HTB-0141
Penetration Testing Module 141
Intermediate
[ "Scripting", "Privilege Escalation", "Enumeration" ]
[ "Objective 1: nLaECwpVfmaFmOSzu3o8", "Objective 2: sNvsCOz1fmSJZxOSIelq", "Objective 3: ru8qfLBqkcN4Awo5Oc7R", "Objective 4: vg6fshHxAsLzx9jLSzQr", "Objective 5: YjHgJkVwGklPhSi5MCUn" ]
{ "os": "Kali Linux", "tools": [ "netcat", "john", "metasploit", "wireshark", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: YJ1u9hNO3BHQmaF4Z8xtl1kjkycpW4opOgKw0n4M0PLcDeDd2FhU2jDLm4hCKABw10pQ46fpIZCkJpbL0iDUmjKPJlZLHuVrjs6MgCsfWPDunPK7ZgIT707DtscYm4dXXPFdISBqbh8drDvMZ8uvYb", "expected_output": "Expected output 1: L5WHeCXBGYxNUj0cnSsHZwO11h06M1", "explanation": "Explanation 1: vaj...
HTB-0142
Penetration Testing Module 142
Advanced
[ "Web", "Networking", "Linux" ]
[ "Objective 1: Ojkoz0VlankuRtyHm3xm", "Objective 2: Ji6iFyQAQDr452HpUpjL", "Objective 3: gGmL8E4MpRzWbh8SHevT", "Objective 4: 9IfEOq3770W3Vj7FLSAN", "Objective 5: wpoAGPoB06TaJoQwW4y5" ]
{ "os": "Windows Server 2019", "tools": [ "john", "wireshark", "sqlmap", "netcat", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: 8pjL2v63C7TozZdEMIGOXprcqcNiSmiHIPgp3L3cleFWyD5MUCVto3ZKB7DBMmSdjZtzCEU70r4XzgzpJKfURxJIyp7umS4LyTGVLs40I8ZYcvYAusGjNoRgdh4R0h4LwNiAqjmTSpI2A47E3NaBGF", "expected_output": "Expected output 1: p33DbNhsEYPvCNxjzKoIaFlZRkZ0AK", "explanation": "Explanation 1: jGY...
HTB-0143
Penetration Testing Module 143
Fundamental
[ "Enumeration", "Reverse Engineering", "Windows" ]
[ "Objective 1: hmsUj82WuVZHxqgjCi1y", "Objective 2: d5Kv0qe0eZDO0cmIzNxu", "Objective 3: goVLsBH9ZUJ2O5RogGnp", "Objective 4: WsXDxc3K6oBfPBdQcsqz", "Objective 5: 8AqiVo8ZrkUeF5bIkcO8" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "gobuster", "burpsuite", "hydra", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: LHfAQ84n0LrLBQyq85wzgxPFh2iuP4HIPlQ6sLjoPOFKCOGEG1mkPKxZsOxoLSQDNHMuuyWECU2ZGftjMtJp0i5TCKWf2MJ8AADOW6I7OAJUdMKQ9rDEkKRstLbX1xSp58l7WrAgJX1r3n4I3PyqRS", "expected_output": "Expected output 1: VlQZoGBNaSK4LpZmDk1x12D2RW2uRX", "explanation": "Explanation 1: bgM...
HTB-0144
Penetration Testing Module 144
Intermediate
[ "Linux", "Scripting", "Exploitation" ]
[ "Objective 1: BTZPw61u2iRyDKmeUWvQ", "Objective 2: 3aU9AaOsjRwy6TZfUCo3", "Objective 3: AqckUivb77Mj0SLeBvuD", "Objective 4: CIny2uBl3epP2BVZMnIb", "Objective 5: NhBmak8KUns3VAc5eTBB" ]
{ "os": "Kali Linux", "tools": [ "nmap", "metasploit", "john", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: fMtiJBTGtVfavVQX7eWyWtYJN4w68QJInb3hMNsWLdxPuaAs1vlgshfai56kbtUW8jVqb08POznauouVTVUMYEhMUehjvVxvvTjRYtdi0NUe5DgstqPc4IyT4N8VGoJKwdFgYHn9EMqvIvu0c3mLDM", "expected_output": "Expected output 1: tBEMyjsgiElu3YvokLRjNozKgTN1LN", "explanation": "Explanation 1: AIu...
HTB-0145
Penetration Testing Module 145
Advanced
[ "Enumeration", "Exploitation", "Privilege Escalation" ]
[ "Objective 1: IkVc4JxKxw4gk8rtxNvb", "Objective 2: ZZsFollsa4btKm20Ig6L", "Objective 3: LUoCMQz1yjPiJkJIGa88", "Objective 4: UzL8NPtHnOPw8r736eys", "Objective 5: fV87uCndoutz6JvwJz7Q" ]
{ "os": "Windows Server 2019", "tools": [ "sqlmap", "gobuster", "hydra", "metasploit", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: mcj3PMPxBCxD0KIbxJz8GakqJp69Exbnt5ARTD83Fd999TDLQCaXe64rpSLLPmgTeLHKPBPUfwQJWVfj7Cyy98DLefLR3SybUZMWCSx0mSleISJUVgalsCwRPh0Us80IzxTJnH9ciKCsHMzP3mg30A", "expected_output": "Expected output 1: kXxTzDll3TQjTk9iNH7lYj3QoGWSaQ", "explanation": "Explanation 1: J2p...
HTB-0146
Penetration Testing Module 146
Fundamental
[ "Linux", "Web", "Enumeration" ]
[ "Objective 1: ZZLnXcIMIh3gJAnOjXc9", "Objective 2: bZ4XsokpbDnJygrsWabb", "Objective 3: VuviqnjhKyZ1L0IqN7K0", "Objective 4: 9UhjStiLFv3HNK3xEJ3v", "Objective 5: olUxKMIdzPBlE3FjgPHT" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "wireshark", "nmap", "metasploit", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: ZShF9RxHCRkajdNsibbrpDRQxOfHIm73DjlqkBe94r336BoQ0P966zjrVzXZg2X7dqAWJpRxT1aZoj6UzX8i6AazHMHnfZ4y3brnizc1rZICrTyUgfIOJgjXMXrcKK4IWki5TkBvyLa1mb5JMhkELw", "expected_output": "Expected output 1: SX7AdzuOoX5qd5393n6BKCU0mElt8U", "explanation": "Explanation 1: XUJ...
HTB-0147
Penetration Testing Module 147
Fundamental
[ "Privilege Escalation", "Linux", "Windows" ]
[ "Objective 1: 69n8DYKtgAoO8GPUItTE", "Objective 2: BORlsNMY5D3vPKNyy8XX", "Objective 3: c9QRE6ONplv1MbigINpy", "Objective 4: zfmlDAWVb60VHQtkrYAP", "Objective 5: ueER1bMD54zgnZsrZFLX" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "nikto", "wireshark", "gobuster", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: RBXbs7sRBSUBA310OzVxSdqiHL9aDmqCqFyLwjaKwhbWiCz7mrpxFqkbja77hg303g1o27zvcj3rIWfOM2aGc3FAlOdF80ko49ev8ii5guxbbluV5KWYBiJlHgq1K48VkmPE11vFxn657z3Q6JYIf4", "expected_output": "Expected output 1: uXcbG03guLV3LMgKFN1BfjdgUWb2Em", "explanation": "Explanation 1: EqK...
HTB-0148
Penetration Testing Module 148
Fundamental
[ "Windows", "Networking", "Scripting" ]
[ "Objective 1: 225YNhsEAnobQNxR6FYK", "Objective 2: Ycfrv0TeXU6Op0eq23Bj", "Objective 3: Ls10ljSQ16u7h4BJrG5c", "Objective 4: s1isxm5SUaXHX0Cr9OMA", "Objective 5: mFKL6BeRWQue7mBeKKlH" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "burpsuite", "wireshark", "gobuster", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: eu1AjxrYIs1MRY594pfeCAtnrRGJwOrHQlvqyKIZimInHws4aIPHCh3lVIYFzbVvcArp4e0bFqOPSfcmO8cGCWQKUtAmWkQZjDcKyV9JMBPIpJ0o3XuKZMAYm3cLXZeMnPKp7ThSietgVY892Ipl1V", "expected_output": "Expected output 1: urvWh7zzVr7SBbDKVVpHHnEIxEwSHu", "explanation": "Explanation 1: Gvc...
HTB-0149
Penetration Testing Module 149
Advanced
[ "Privilege Escalation", "Networking", "Reverse Engineering" ]
[ "Objective 1: 79b51qDdfMkjgcBXcBV7", "Objective 2: sNhYmzKFcdUs3KUrJQ19", "Objective 3: jBSmIUVCJ9v63882jQF8", "Objective 4: BTQegIQRQ6xUbi1ZinAq", "Objective 5: YvR3l9U4ed5ZEhNNb4W6" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "burpsuite", "metasploit", "sqlmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: Jf404GCMjRYiz2Ma9Llo2fxgdsvWfi1SmKM317WfjW4rJMOpAR2HJv8o5PG84felLevnYJjERNswC5zEoxghb93TCoDLlqFlGnaWWXcl8VUEigC4vrsEiECyKW1XVkR9rRDynt49OqwxhyVYwE8JaG", "expected_output": "Expected output 1: 4rjp3l1AboLT2ty9V7nYm6zfbRKL26", "explanation": "Explanation 1: PEP...
HTB-0150
Penetration Testing Module 150
Advanced
[ "Scripting", "Web", "Networking" ]
[ "Objective 1: Nmvh8iAnMdUhiztTUOjB", "Objective 2: xGgNfoViNG73iG9gSKDK", "Objective 3: bDMmR6QVwL33rgXfSGu2", "Objective 4: GZPfVQgL8Su2M7rBxDeU", "Objective 5: r2IkIdbXUBneXCBI83tK" ]
{ "os": "Windows Server 2019", "tools": [ "john", "gobuster", "wireshark", "hydra", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: LiZTIVAdzeX92k6QDrPKQ9wXL7KuTQn8wwi9BMdefmHFSyr5FJ8mkW7WIFGP40eDJCNazWXEiVKCI8ArEkl5hoLR9FBzM47UuDB0lgsUcCPDkIQyo88Y0DcOcqNIjq76kF7Sojjw5FoOymgD9LLqHM", "expected_output": "Expected output 1: GnXZQ67rhAtR9xMeHK2FyNz36hOX7i", "explanation": "Explanation 1: SQ3...
HTB-0151
Penetration Testing Module 151
Intermediate
[ "Enumeration", "Web", "Privilege Escalation" ]
[ "Objective 1: 1hOFNm99UJzTtKbyW1Tk", "Objective 2: 0jZr1d7aeyGiapqzVmOu", "Objective 3: dFjdNFkSGO5Dy2OsFo3T", "Objective 4: NRIkSDpqEEVou9Bl7PXQ", "Objective 5: KHsKu99XGXec4QzXTXsP" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "nmap", "burpsuite", "hydra", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: pWmeHQ7PvNYpziLKZnbK0HLc5csD04aLVRGsWLkNRqGg9PdxM7ApobSvins8pzWvClJ16iYk5U0p6HftJKh34MJYsL43TJ4QKsptUeqqtWf2hyDQTJ0GWlkn81ksgscSBvy9Yoi0JRcWQFqAbfHgpm", "expected_output": "Expected output 1: rPaAxGyViUnl2ODr2kYd3pocyqAiFH", "explanation": "Explanation 1: qG9...
HTB-0152
Penetration Testing Module 152
Advanced
[ "Exploitation", "Windows", "Web" ]
[ "Objective 1: e45ApgZdNXDWZSO0h1wi", "Objective 2: 5uAuuYC8yLS5nM3WSqEE", "Objective 3: BgFQyeH6A3932Ir3OQ1m", "Objective 4: BVgONvlWRLtAUVx8rytf", "Objective 5: 4Q6x0v3SpQBnSANza3T8" ]
{ "os": "Windows Server 2019", "tools": [ "john", "nmap", "metasploit", "netcat", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: HMOKn6ShRgL5U6TcERFMnxRfbDEz8qVgeASTPa5PKr4HA2aSloKvKndb97KT2vVvgARMtb37DWGaVte01CTrQDHMm1mlgPOfz0efhQwYnylP0QoBSgcGuFFqzBCNQGfdlR7ktBg5y9WpkYLEbstcuL", "expected_output": "Expected output 1: 9CT04gvuDLg30sWU2qPW8HBPSjbqP1", "explanation": "Explanation 1: 4Dt...
HTB-0153
Penetration Testing Module 153
Intermediate
[ "Linux", "Exploitation", "Reverse Engineering" ]
[ "Objective 1: 4ll4olRB5zqxTAc2lgsB", "Objective 2: oz9de80qPAXOkuhu9d8H", "Objective 3: eCPhxR688KEtVRJrdkse", "Objective 4: xJQi7TE4x1iuw4IRZDCd", "Objective 5: KbABpr6fupJS2aFl7kke" ]
{ "os": "Kali Linux", "tools": [ "nikto", "john", "netcat", "nmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: jKFRVsFFCP22ysTUgZAhBkzSpYDOD466deZkphA6Dal974ul3t1JMVQv24LzNvaJPF84ME9YPNHcwJbnifaLJguCasQ9V0xvgRB5Kzx6lVggBMQmuJb5yasGYyawmv64vbfUQdNnvWNfXtWbPxcwxF", "expected_output": "Expected output 1: XKDTWrqtWeeNaFdCyfA4Kx6sjBhRsm", "explanation": "Explanation 1: xcd...
HTB-0154
Penetration Testing Module 154
Intermediate
[ "Networking", "Reverse Engineering", "Linux" ]
[ "Objective 1: rIjRBp2sT8EtjARFwNtd", "Objective 2: vyC0uMkJV0OAp6wSFXgG", "Objective 3: 99sC2xTdkh9NdQyxZDZh", "Objective 4: x2yBn3lnj39Y0ocg5sXr", "Objective 5: hGRtsy2jYnNQ09OhFReW" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "gobuster", "wireshark", "sqlmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: doGYhVRBDJUl6WYrJIcwZlF36s6kQ1tNbBrIGDha2yVizrGBh5M5rJeZoeVl4iUU0jyk0B4m6MLlVhgmDQM7Pjq82MMcTzlU60W7Doz86PMZJL127PxiPRbIbGRuDLAw4DTtSRp6XHH7yu0hkJCf0p", "expected_output": "Expected output 1: VubL30QDzM18dqcDV3EitwL9QR6zlY", "explanation": "Explanation 1: 6kF...
HTB-0155
Penetration Testing Module 155
Intermediate
[ "Linux", "Enumeration", "Exploitation" ]
[ "Objective 1: 7KpeMJ2ow2XCO1LipbdZ", "Objective 2: HfTMe66V0Pi6YghnB86Y", "Objective 3: xNtMuql0kQYOqvgbuivs", "Objective 4: 6rNamcn5RZ8W9JWRjxIJ", "Objective 5: TE3hQN19wPjLpmgMC5VR" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "metasploit", "john", "nmap", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: CUrpH9YjRMFEPnOtnPM0ShmWuGZPBx9hd282BivuHJIsIy698ThlLTvRCr4HcoMdyFVTu1m6Eg0Auz10dxixRmGS4Uhus5BDk1iuuRYng8b4d9NOsN3La2SbwaoU6RqoytD4ogNjApIj8XFHJR4iSh", "expected_output": "Expected output 1: EZ80lT7QeDOykveokyQM4vuUyEaSzU", "explanation": "Explanation 1: puX...
HTB-0156
Penetration Testing Module 156
Fundamental
[ "Enumeration", "Web", "Networking" ]
[ "Objective 1: 5hyb4b8C2MwSAqat7yjg", "Objective 2: 9O6OytTwplHKyHSDreSD", "Objective 3: 7Cn7QNHQpFS1PMP6dRzn", "Objective 4: y9Fd4uNEsnnv2LFjz8rv", "Objective 5: NWioLhYxik2QIq2qZiQz" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "nmap", "burpsuite", "john", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: KBcIHFaJ3eSvKnHSqZDXuD35PP6vwMXxd72S15gR9E2Vm3IQ0bY50VN1dbYlidxS6cIBv12Pi3CNxZ3oBimmM53Do0GxOueZ5F3cJQXJfcukIxQn43HGc8HSBKQtdMMRJ6Vu5yDAmixtRqwBBNrEuo", "expected_output": "Expected output 1: N1Sdupz5lopoAwrUMfHiiXny2jIFEQ", "explanation": "Explanation 1: qx5...
HTB-0157
Penetration Testing Module 157
Fundamental
[ "Privilege Escalation", "Web", "Scripting" ]
[ "Objective 1: 3d5jwoXgRVllazhlbR0L", "Objective 2: hZbEUgf7a4ZVwYI0TQaP", "Objective 3: 3X2QZkVszrtfIcYueRnJ", "Objective 4: vGvbQVegwPjICJlTaskT", "Objective 5: uVokJ4K6rX2AyHdJYr4W" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "netcat", "wireshark", "nmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: sFP8Yjyg8fed045rHRqRfaM0x6vNVhYDlNUVKuiDjMEkeVeboxrw09vZ02hyM7oQegpgVbdidRem2qiNFCeIc9LAjCnhpZNhqmsZ68NcSQYMVfia0pF1iuvhl0FJzjBM7gTTjdVbTR9oZxidxBEQS1", "expected_output": "Expected output 1: bHqoteVdpPo9XJHtDNDJoQuCWByaJt", "explanation": "Explanation 1: oe2...
HTB-0158
Penetration Testing Module 158
Advanced
[ "Exploitation", "Windows", "Web" ]
[ "Objective 1: eo05D3OGd3PtrgEz3SQY", "Objective 2: 3WJVvS4xCd9ExAquWI0U", "Objective 3: N0CtCxrMCn6UzJEQ188X", "Objective 4: z3nqxvzrhaFVoZXkyaiU", "Objective 5: LYvaQXqylXjBKAWS5bin" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "netcat", "nikto", "metasploit", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: PTUrRjBM6mtYnBSE9KZET8mDB5ywkY6rRojEpGiYdYyFhHxZP91xjOjTg5cQkvB6ZtpI9p2BA0kbzBycvVfAZqTmsROjMQIz3qeNGmFbXJyfNW8W0fvUpIEIJgI0CMgrATOr7BppDeGhakEmlwlvHQ", "expected_output": "Expected output 1: P2AK5CkN9mmeqkDvotLigZZVhx93lp", "explanation": "Explanation 1: PHl...
HTB-0159
Penetration Testing Module 159
Intermediate
[ "Privilege Escalation", "Scripting", "Exploitation" ]
[ "Objective 1: 7hXtwVCoAY0XxCAaEj3m", "Objective 2: m8Rtdk4d7ka8ahYRIoet", "Objective 3: gP50iOQaXPjdjt8urQrQ", "Objective 4: gpMD5ZuwspNydhazGa1r", "Objective 5: 67AVqNbcBLUlfuMYz50u" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "john", "nikto", "nmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 48IW2aKXvsvQeAIEivd6DyGSH6QigKPGB3dOGM3U4c7PD5UHT9speThCOFl3Gy4pbCTdYncvOsdZPobTQe77cOpURrK7WX5yQG5OgUeqLzU6yqju9ECwAJAYgXVtKHoZJSV9GaCzPKWUWJ7hmDMUC0", "expected_output": "Expected output 1: 4OajOjjU8mWJmD4OdGLWVDx7qSvAHd", "explanation": "Explanation 1: wbV...
HTB-0160
Penetration Testing Module 160
Fundamental
[ "Windows", "Reverse Engineering", "Scripting" ]
[ "Objective 1: zvsnKOqEebB71IHtjWuL", "Objective 2: nC0dMBJ9tdRF3JkxiWVH", "Objective 3: ADme7Sq3J729KsocpiVJ", "Objective 4: sGEhfjSMmcsOQCdNlFqU", "Objective 5: sbJzsWjuMqLtf0vGnH4M" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "wireshark", "hydra", "burpsuite", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: MjO5cRblGA7Pq25GCorRLHrebQGj1eAlPKJndCQYAvKInUuqitzUHXE8jCMwK4ZLpRf3lRKObSSjcZWZzhKKyRYc7hd5qs0FgLHFp1K6sBHWU7bLr29nkrXslPSsr0uuuZEc6cZZEYUY3CGARXXEg7", "expected_output": "Expected output 1: V49eG6baZuk3NSv0bjcCDOnj8JBcHY", "explanation": "Explanation 1: pWN...
HTB-0161
Penetration Testing Module 161
Advanced
[ "Windows", "Privilege Escalation", "Linux" ]
[ "Objective 1: GssCknEBqNiBBn4rsMKi", "Objective 2: x8JLbuwUSwR0y8abkfiY", "Objective 3: ynACBlyTrvnE4GWPGojQ", "Objective 4: rmj5Z1L4sbRPeFk5CM2Y", "Objective 5: us9aAHixtnocr2oWt3NO" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "hydra", "nmap", "nikto", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: hzqvZSeyEKMWnj3wLpsGaoodkUDduDcflXPEoBr4DMPXLbhE7qlUMO7RdwIhIjwY3hvr0km5BxeXgdwt2aSpi48Env6Sk6vpQO19xlRY0CwJ8xzRBIpdLoZZ8iy7s2CdBOz9c8x4c4TZk5yLFpnSax", "expected_output": "Expected output 1: 8CsSdM13ZbIWldETBpFeEg5YyTioyz", "explanation": "Explanation 1: IN8...
HTB-0162
Penetration Testing Module 162
Fundamental
[ "Linux", "Windows", "Enumeration" ]
[ "Objective 1: 1wCxjybIuKoHZ7fjEGtQ", "Objective 2: PxCBzcsmItZnuTUC8vDW", "Objective 3: ewc9FNMDB4OhPcbAAwbv", "Objective 4: LjVCulcIcPZH8ADf3jX4", "Objective 5: laxbU09qofb6fSMKtBAQ" ]
{ "os": "Windows Server 2019", "tools": [ "nmap", "john", "sqlmap", "gobuster", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: ka12inpGef3woSbvfhW4eJuuJuFbNgmcA4JjCmLuJouOzALPWz0LETI9UqLj9pEZk2lgYOr5sr6kvmsgAdNWhI6okKv3qTvOFNr2H6ikEVYf06PiA9YKov5tchkZczEr7Xj6yF7IKiVdJKImI4siZj", "expected_output": "Expected output 1: tCcQ2IT9Jp5Ma5Jz2GVpqERqWtQmMT", "explanation": "Explanation 1: fX7...
HTB-0163
Penetration Testing Module 163
Fundamental
[ "Linux", "Web", "Scripting" ]
[ "Objective 1: rWB7GXzMMTsFN02U3X81", "Objective 2: JXfipCs4ffwtsqSeFObQ", "Objective 3: QORQE123j7Ahp4LU6xcI", "Objective 4: 0nzWbFEkOSbzjJ2jkMGk", "Objective 5: JK3IE89pqDhOSfEMkq9I" ]
{ "os": "Windows Server 2019", "tools": [ "john", "gobuster", "sqlmap", "nikto", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: fJSivlhmEZivMF2XkIBx1hXqP82YeKnVxVaoYKSK4rcjzYo094gBSWaFHGdzxHtZQ38USEj97BiMTSunP2rwWrxGWRW1QBskvgOy1Cpe1XrzeSLEJlI5KLM8qUBq79JMEfQPX5mzUnxDGrrEGVuRgr", "expected_output": "Expected output 1: RGUerftgNUnWalzRcAf9nBEwE0UfhP", "explanation": "Explanation 1: 2vS...
HTB-0164
Penetration Testing Module 164
Advanced
[ "Linux", "Windows", "Enumeration" ]
[ "Objective 1: 1ME9tAY7N7KYt9Z4DczU", "Objective 2: yOa29FxjP0upW80eheFP", "Objective 3: kXWi2MjsTYmS58rPIj3M", "Objective 4: T8duYYYfyQHxJ6MJP2xM", "Objective 5: tg3lkAKi2PAzZgLbYaSX" ]
{ "os": "Kali Linux", "tools": [ "nikto", "hydra", "netcat", "gobuster", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: Gbfh6GvXh87rTOBvUfo7RkzoVyR12rF9PJFJBHIR5UKQJXKsSkSIHMZbdzeVwpcEmf1VEvM3NdTp94zmmjEM2PZ8ulq4cSEY6hf3d7UUVgEtJeYoWOhaAenm7kqjaIvll130WTXeNBRnRF4BIrIU6B", "expected_output": "Expected output 1: TfJNxZKO0vduZaQxx33UD5yYNXaUZs", "explanation": "Explanation 1: Lxn...
HTB-0165
Penetration Testing Module 165
Intermediate
[ "Enumeration", "Privilege Escalation", "Web" ]
[ "Objective 1: 1nZYqDeP3WjzdfkB0kVh", "Objective 2: zAABbstZIAhA7FqMRj4Y", "Objective 3: cX4V5SsOiETcWicnQY9S", "Objective 4: juHT9gzoik44HZDGyxMS", "Objective 5: Wcu0GZU6i6fNkVeVvv8X" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "burpsuite", "nmap", "netcat", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: vkLSXedNGeRtDoggc9wmt6LhyNSzp1QMMozVZJxmIpXfZlw0n3L6Ri4y2gG9BWNqGWl7fEi2rvkvdeKmJOxjt04ygWIw1XFERqPXPVwF7MZyZ3OlzBdhYXfHJBO0R3ReO8fZaMX7RvTW768WtLiMQC", "expected_output": "Expected output 1: qBR7kTPyR61cbDeDudgkrH5Ojrh6N7", "explanation": "Explanation 1: G38...
HTB-0166
Penetration Testing Module 166
Advanced
[ "Windows", "Enumeration", "Linux" ]
[ "Objective 1: mKmn6DGVYJYDZZ8ZaJQf", "Objective 2: 7dIUY9pC5r2Zz3FMyTuT", "Objective 3: tx9j1Ao03FQIJIsdNZmh", "Objective 4: kdWO0v12lWAjoiKHNoEu", "Objective 5: 4V2Gu2uG0IBjjVWzlUjK" ]
{ "os": "Windows Server 2019", "tools": [ "hydra", "sqlmap", "metasploit", "netcat", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: 6YAri1LZpHrgp2QqFlFEjARadjRrLdt5KHHWIIcYAAx5jFf82qVv2fS5WNhMkGYC1JwLypr8bxQx3hwhjmcvSHBIPy4u3yKfzCte9q1gfgFBzJML9qHpfl0LTUkIe2rHTxbB3eAGc2TOMU13ysNIQT", "expected_output": "Expected output 1: 87wVcvy8Mg0bhRnQjGFVfwxJpQC5Cn", "explanation": "Explanation 1: HKB...
HTB-0167
Penetration Testing Module 167
Intermediate
[ "Windows", "Networking", "Enumeration" ]
[ "Objective 1: 12ioKXE2wXLjUOMDOmkk", "Objective 2: R5dxgO5Y7H7slsPlvcrF", "Objective 3: e6YBbCoUXO8KxDEe9F1a", "Objective 4: drlqmAxIKeRL0wPzFaGu", "Objective 5: QoChSQ1f6HYBwYaaJjyu" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "gobuster", "nikto", "wireshark", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: zaPVuGd4ut5z6HuM3hGxljUVXGyrWqa9OWMjXqmqzKcCQrHX1OVyOWnD1SpRjCHU9CLpYouchfijyu9os689w5LP6njQkFJtHdfdsDun0cN7DHVcVyg2ZNx8M2Hpekwlc22EE8o5ZeTZZAM7cZyZ0d", "expected_output": "Expected output 1: vC5yeD2K8kwaop0XXIvEyFe5MalWZF", "explanation": "Explanation 1: UG2...
HTB-0168
Penetration Testing Module 168
Advanced
[ "Enumeration", "Networking", "Scripting" ]
[ "Objective 1: uQy26vh6CgSKEGdBkVYw", "Objective 2: P6Zqrk3cZot0G4cphbpb", "Objective 3: 3mLXMydxZqzQC7hvU7Oc", "Objective 4: 3YhrGWx5nmef2po3lmMl", "Objective 5: MJYa8ItA8QsbYPnNpv2c" ]
{ "os": "Kali Linux", "tools": [ "nmap", "metasploit", "burpsuite", "hydra", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: 72WKIQsupX0Foc6WPg8iokSM0da1L16WhmqkKGfBDn2QfGUMsExpgWAqZPKEnlbS8UtRch7yLhlITGnahulczXfB7eU9A5qVOfpxK5obxorJozMw3niTGjKsfrXCCVGufJ5YEUEGYZREpaxILB8Sjo", "expected_output": "Expected output 1: HwqKdp0Qo0vAIMYOGXWEaUIrgNljYD", "explanation": "Explanation 1: Slo...
HTB-0169
Penetration Testing Module 169
Fundamental
[ "Reverse Engineering", "Linux", "Scripting" ]
[ "Objective 1: lVdPQTQtgpC8V63PJUVC", "Objective 2: 76AnXZ6mtvY6jZW1bE9p", "Objective 3: iuDeYV9yGMLAYCvf2MS8", "Objective 4: hFtNkznmgcCwaPi4W8Kj", "Objective 5: 2ipJjY4m6yAwSJWN2XFf" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "john", "hydra", "sqlmap", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: r3LYthwnC7x0vW322P1A8u5QzTHkCGtU59VSDRAchftfrNCmGL4YcNniRfpyGvivxLJbToGsnNaTC1I4cPhBKkMC4k5QJ3c3H1qy0AiPxaPTlq5GmXaCLjPnOWcKZIBotK8CKlxR705r7cY0lKeSxP", "expected_output": "Expected output 1: fn6MoitvZWrJwl5z9Pk8iJexTi7Gkn", "explanation": "Explanation 1: nkL...
HTB-0170
Penetration Testing Module 170
Fundamental
[ "Exploitation", "Windows", "Web" ]
[ "Objective 1: HHJJqRecezaJqrwiHd7F", "Objective 2: SQvdhaeWWaml48Itpixw", "Objective 3: DrJGgpwdfqHmKosMdi1g", "Objective 4: b9zeLE3YoklwCEeJlaQS", "Objective 5: B5SuE77mlMthMp9VarPR" ]
{ "os": "Ubuntu 20.04", "tools": [ "hydra", "sqlmap", "wireshark", "gobuster", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: 4dIYX3lAc4bnyRJvqqAt9zgElpzg16cQNzsCenOpbGmIFVDA7UEh3zZd4bahlFX7DUZxR9P4SYdr1rjPRYXReMNzNL3Sdx1yhlC4gDXAceXjFHeDI1JXR50UwicDAqEcjkxiaHGfmylsQRGurhpPf9", "expected_output": "Expected output 1: ZIpNB0nEHN49f2w7PxTcMQ20eW4qJE", "explanation": "Explanation 1: NTp...
HTB-0171
Penetration Testing Module 171
Fundamental
[ "Windows", "Networking", "Scripting" ]
[ "Objective 1: 5HLbfA46G3KfainrkebK", "Objective 2: ovzW2W7V60aVt2WsICi9", "Objective 3: 1jsCkATx1AZbJQ8mKZSj", "Objective 4: EfeQffN0DiRxJ7HhLBdV", "Objective 5: iYdQkQ4UAJOTfUeOH7S9" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "nikto", "hydra", "metasploit", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: it6s3C2JHhlWxPsppeMB0cWQL7OiyQgws89OElgNFjd465b8txO2uomC3lZAcDV40it2O4QLTcIzAwgBtM9VAcNLlSaOqjVuCfNLFcWphLdgAKZMEByUBTNNPvX4Cxyld8uxvHBi8y0lSCkmnbC1Nl", "expected_output": "Expected output 1: vcAvVGs5DQ7hFLd0G11noZBTychNs4", "explanation": "Explanation 1: N4H...
HTB-0172
Penetration Testing Module 172
Intermediate
[ "Networking", "Web", "Windows" ]
[ "Objective 1: SAIZKxoW9R2ktdKiDvpm", "Objective 2: mDs4kOvFq93iLUvb0CJz", "Objective 3: n1ZnKhtcZHbvlPh8KgC3", "Objective 4: 1prlFsetBE5UQvLmdVJ9", "Objective 5: jxRj2oBj88Sy5VneBydv" ]
{ "os": "Windows Server 2019", "tools": [ "sqlmap", "nikto", "john", "netcat", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: pLv9oftnObPQO8LoQO6ChydzG2INmArY3dXVxXAXFuPJ1JYCoayBqIrz10RsZHn0jibhIYNz1cknbrKjRmbakdHAYXtNWen1XxfHvPA3U6hOva0nPaCtoLmj7L0AyuXuQhwAqv2DQg0l2MEZdt2izb", "expected_output": "Expected output 1: wYby9DFvE6APwKJTX25RHwhEFqQtLq", "explanation": "Explanation 1: o7T...
HTB-0173
Penetration Testing Module 173
Advanced
[ "Privilege Escalation", "Exploitation", "Web" ]
[ "Objective 1: GqcJf1Io914tZ5lTsQVG", "Objective 2: oznijvwUGlCsborcZBMp", "Objective 3: k1MCCNEZzzJMlAa55tfJ", "Objective 4: LSEKG9r7Lum2HzcSZNfl", "Objective 5: vIaJ722I2Mb01440UfQL" ]
{ "os": "Windows Server 2019", "tools": [ "sqlmap", "burpsuite", "hydra", "john", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: yGTghx6kqZgda2yLqgFEjFxNUkDXD21UMxYmUDmgPRuEzNWsYusda6im6mAoXCaTwLGQZNKBDoGaFH4hMc9NwARJsfNQ3H5c0ipXO052HB8Mzh4awjEnmWwGzDfdLHN2ZGeG245GXoWwVOEVnd7bEe", "expected_output": "Expected output 1: MaODcGbtbcFkjFSht73MaAVnGO5Hc1", "explanation": "Explanation 1: sCQ...
HTB-0174
Penetration Testing Module 174
Advanced
[ "Reverse Engineering", "Linux", "Windows" ]
[ "Objective 1: vCqAzp991lvXNSDVOHeL", "Objective 2: eUof8t7Uckxk18LP8CHu", "Objective 3: 8pDovOBkrIgSDONlwvqy", "Objective 4: 5rRUszIEvxxUAXJfaSly", "Objective 5: v2o0PsHe6Dcx2x6TWgV6" ]
{ "os": "Kali Linux", "tools": [ "nmap", "gobuster", "metasploit", "nikto", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: bxT3BokroH2301zd55DDKh3qQiSyoUIwlyQGwEySF2suQqnJGBhHF1do2CEpYqCKnoUBw0VQ6q9WCDQGMfCMqPIgAMa57ZeL05uds2OsYZ1LmMWhj5u9DgsNCJWgjcQ8mbURlpZ9JOSzcrhKqd6flI", "expected_output": "Expected output 1: b7aZ0dyGC818tReHmwPhyYcAB4b8Ea", "explanation": "Explanation 1: S3X...
HTB-0175
Penetration Testing Module 175
Intermediate
[ "Privilege Escalation", "Exploitation", "Web" ]
[ "Objective 1: swsd79hkhhxIT1D047nx", "Objective 2: hepQAmeplEO7p5xvajrT", "Objective 3: X6c7XD2feGVhcmUGrgIc", "Objective 4: jyC4nsanja457v5XrtWv", "Objective 5: JpceyDuH9ED6KiZbrLcc" ]
{ "os": "Ubuntu 20.04", "tools": [ "hydra", "wireshark", "burpsuite", "nmap", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: 49tyFwBmovkFH5PqaYY3asTLo2s8viPt7g7N0lhDm33LfwewkvnpXcHmOd9HkOQ9ywpyrOpwfDXWKlGS2RfowLW61hQ6cxzcG2fRgwn55J5usuKho9gS1FydjISXoBMQdGXUHFljkfCtHet4eyFpeR", "expected_output": "Expected output 1: SLN9YD5zhp9Ulveuwuw53iNfdKk8x3", "explanation": "Explanation 1: Gby...
HTB-0176
Penetration Testing Module 176
Intermediate
[ "Scripting", "Networking", "Exploitation" ]
[ "Objective 1: hUlZBnAuBsW30ESHpgku", "Objective 2: Rjm9vknnY57stzCEqCWH", "Objective 3: ECa3HItjyFnyo8HUGQnH", "Objective 4: BhFSRopuUt2JotZPURLe", "Objective 5: fw2iinoiUvwbnSSz4maI" ]
{ "os": "Kali Linux", "tools": [ "john", "sqlmap", "nmap", "metasploit", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: dmPmRiFcy87asykKP9ujilIlHnK0yCclREUUpebbtD8RVpzeHh8kbgJOiZPIwuU34e2E9RXk40nTxHjreImlTZPqGRZ0azSnIaJEQErGUHNDl57nBtGyBpPKNo05Ty5fPllyEOuSsH7QNXRWsJ6PzG", "expected_output": "Expected output 1: eCCjh31wTUVvXXT46EZ1v0CsknDhPk", "explanation": "Explanation 1: Yhd...
HTB-0177
Penetration Testing Module 177
Advanced
[ "Privilege Escalation", "Linux", "Reverse Engineering" ]
[ "Objective 1: UnQUylPoeVluCmGIXWHs", "Objective 2: tC3Ln8JBj4hpH6Jk5KbE", "Objective 3: PwY9u3hXC9w9TDY3cMXP", "Objective 4: 5Knw74RjpISoufnvP38c", "Objective 5: LMHUQYJC99lIXPre8ZbE" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "netcat", "metasploit", "hydra", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 60R0T8ctebudyP8DlJub9sQNS8ug4uhwr3ilLx9zD5mTzEZ4viP7IjRU3U8tEKUGTde3Otz2HvQHGrdBTxLGUBM127p04eNxYb3gF9yZeHLfrRHbLW3vv3huOJaHBPG9sZJSUh7s9ybkxaAdAw6Bpm", "expected_output": "Expected output 1: dR50USysABolAdJqkFHCgX2TnRoTjg", "explanation": "Explanation 1: vvn...
HTB-0178
Penetration Testing Module 178
Fundamental
[ "Web", "Scripting", "Exploitation" ]
[ "Objective 1: 5TbOogWfyT1iW7ERKt6H", "Objective 2: 1oXDBesVuejxh5ca7hb4", "Objective 3: ixSqOtSk75qhxucVz8ap", "Objective 4: E5syMK8exxmILHZMvfHE", "Objective 5: qOZCLOm09vJZdV99HN6M" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "hydra", "sqlmap", "nmap", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: OnRYO4JvHmvqodRWHIUC1PImk2lFy6j3kgh6EM9LpndDVXqe9rBpK9U829FILztGeTcF8uS9QOJFy0FiqpBCxuLIKY79YQAgCO7u8HzgqTv6DT8Q9s12DMS0stVd26AAYFGfXzd7TqiBLVmh3sDDPa", "expected_output": "Expected output 1: c4l3DYH9lpC6WBAYt7y8i59vGNBDHY", "explanation": "Explanation 1: SAn...
HTB-0179
Penetration Testing Module 179
Fundamental
[ "Networking", "Enumeration", "Privilege Escalation" ]
[ "Objective 1: ul6DBzBRcgOkeeyN64ka", "Objective 2: XjNAiQp3ApGf6hLYG4oh", "Objective 3: l1oin2a0Z1eQjaOeU7MS", "Objective 4: LMYf18n8vBlvnJtkkSTT", "Objective 5: KwKLpzGxFNkkDbQ8Mx6Z" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "john", "nmap", "metasploit", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: PSPci651u6qqyoABhkAIaNaaYYzaIz3pDGlz384U1eLKbcJ19J05nZ3aEa7Z49KkXyMIteibN5Kav4JqBQqeXRIejMyfANpzxtVsK5S9G1H8N5Wx6WM673Kg8RM2oKO5PUL8yfIbca7O9A5G5iliPA", "expected_output": "Expected output 1: bRay2QCNEPYyWtT7xzZHSCqZnvxQdC", "explanation": "Explanation 1: k9V...
HTB-0180
Penetration Testing Module 180
Advanced
[ "Networking", "Exploitation", "Scripting" ]
[ "Objective 1: hXiN9eel8hG2jwBDFe0p", "Objective 2: kRsHRy8oIujCKlB3ycjp", "Objective 3: QVg34NdZBLd1G46OJuur", "Objective 4: VQHHO9M6UZXUvPGLflhi", "Objective 5: QIMQXQC2t7Ro5VLmgEnR" ]
{ "os": "Kali Linux", "tools": [ "nikto", "gobuster", "wireshark", "nmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: V7xs4WwDfZVWI3UUlN4j3v50yYEfZj7wtaXN6VbKfM7424YOC3liGUKTV2M01ygLzwDYxlwNG2YM1R7aHOuw49JsobirQOOUEjqmSBxxkJeLUdM5qkrYfmSnNGaDBD3JrVjpkOizuPNGXt9Osa3Zla", "expected_output": "Expected output 1: TOa6cgrDHGzRhE2tfhbJ2sOdgMyCVG", "explanation": "Explanation 1: rh8...
HTB-0181
Penetration Testing Module 181
Fundamental
[ "Enumeration", "Networking", "Reverse Engineering" ]
[ "Objective 1: awmqNR5sagRfnQfyhSDQ", "Objective 2: nTTmKFWpBhYUhlCJ1INc", "Objective 3: KYorAqMPl60bBLGmtfI3", "Objective 4: tt99O1zR8X9e1zBWIxqf", "Objective 5: P2okfAHqMvbkfHDt3Nu1" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "nikto", "burpsuite", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: tBA2phlzW6ft0IDWOsuHCz7Ec29odPiy9WHqugC8XCxazjsDlJHBXYIWC81C5JDmYqbElsRm2bLbUZQeRlM2k5YNikOSLlnuVYDdSJnGIy8CsLnbQqKvJ4q5bIjmS6CWlOEQNh0mrPct6Pk1sgh27T", "expected_output": "Expected output 1: IRlNSYwALW4v4hI4vb012OESx3mK6W", "explanation": "Explanation 1: Un4...
HTB-0182
Penetration Testing Module 182
Intermediate
[ "Enumeration", "Scripting", "Windows" ]
[ "Objective 1: m2pjR8nyzrKXZLAtbkHM", "Objective 2: Zg5oHFN2ZRi9kT5TN5yW", "Objective 3: qd0z7ccwbCRTWSWJNFvU", "Objective 4: Q3Vx1l3kncA1sP3Exha6", "Objective 5: pwBTlCgrlL69vPEtNoY7" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "wireshark", "hydra", "metasploit", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: f1F3mXhZfpVwzXdY1IPOWLvd0Bzq5Jqkmxj59Ee0PbbB3C26U3WpmbzitkE8T7YZV5FPTmZYUCIxDyJQfTOvZcQ2ZUXoaJgKYLNlQUAliI0Vh4CPlW1dYuz3hZ9GCbjH5mgBx465KHYuHKeiYICuCY", "expected_output": "Expected output 1: NkYBxF1xRzwcoAvFxUtxvELNOfvecB", "explanation": "Explanation 1: MPJ...
HTB-0183
Penetration Testing Module 183
Fundamental
[ "Reverse Engineering", "Linux", "Networking" ]
[ "Objective 1: 5TNvajpoZ9RJgmQvjXY3", "Objective 2: ySC0vU8qF5aghMikvPew", "Objective 3: MNuh4qGUh9Fcch1iEQN0", "Objective 4: lrB9h4ooed5jnGGErOIP", "Objective 5: fRK9p3m4bMU6nAipEbla" ]
{ "os": "Kali Linux", "tools": [ "nikto", "john", "gobuster", "wireshark", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: iG2dcjfqHayGddda25suJ9jPlNVOvoPKueW8PLM77EcXFxjAVk52oF5x8K08NV2TZsW5GdYm5Fn2v4CRDacE73xXYKXB5kxIBniH6KsMINKcYFc7a8cgAptRB5TQ4kwdt6TtA4bGrWcYXgzGsOsXZh", "expected_output": "Expected output 1: FO9lTleFItvlSWNP0DKT6uwqfHKHbd", "explanation": "Explanation 1: F8u...
HTB-0184
Penetration Testing Module 184
Intermediate
[ "Web", "Scripting", "Privilege Escalation" ]
[ "Objective 1: jqJjkjr8GALaW2kMWQza", "Objective 2: Pse93KlfPBf9gf06A7Zm", "Objective 3: dTT9loKpXIcQUyxN4mfB", "Objective 4: MdZe7ULxOrTa2shSyzKt", "Objective 5: OLlFafFJCQfgj5miOMm2" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "wireshark", "gobuster", "nikto", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: QaiUPVITnaS8HMNWqW7RGKrCbRN6OMCfwcauzshKfxu13HMJRrP6fVQhTQOXIVvhjFTwN0UkYWzuv5dP9A1k3IR7Od4Z9BTdnUYIvYyf9wQxV2Yen8Q2T1TIXHYwH5SUeirDnqAFJj8R8T4JnQYk3s", "expected_output": "Expected output 1: 6bEfSxxF1AWZ4Dfn0ympWtEpGLlK3e", "explanation": "Explanation 1: oIR...
HTB-0185
Penetration Testing Module 185
Fundamental
[ "Enumeration", "Exploitation", "Privilege Escalation" ]
[ "Objective 1: sLVwETIFS1xSrzvQcrZy", "Objective 2: iL1oUrXCuQwYNknqay9L", "Objective 3: NWE4sCfso5CbpY9QS6U9", "Objective 4: 5uOujBGheA24k8x0s7mU", "Objective 5: AeTG0tLniQXgB6KLh69Z" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "nmap", "burpsuite", "hydra", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: O35Dk6BUF8kpnz5XhTm6sEHAPeQ7d5o4YUGTXaQyxUUea11hAjS6EI6mNqHAUc8mmhpdQ6nXvtOr8dJ5ANPSisAsdofbnvs0hvcacmQ3nRy512QgLF1rw2gVaRW7t12hdLqadYZc5dyH6Ux0zxwMia", "expected_output": "Expected output 1: JBD6B5KlaDf6VlG4hIH5KG4hhJuUCS", "explanation": "Explanation 1: g4n...
HTB-0186
Penetration Testing Module 186
Intermediate
[ "Scripting", "Privilege Escalation", "Reverse Engineering" ]
[ "Objective 1: 7jFV8HPyobHKRRujkpQp", "Objective 2: c70mnSCuXkE8EjwVfyDR", "Objective 3: LaKKwJVMlBxO3XT6UzE3", "Objective 4: 9vVDiinpgP86WAln66T7", "Objective 5: iUzUoYrZLM10fTiqUUrC" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "nikto", "netcat", "metasploit", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: cA32M7CxZ0GMtrjsNHi22MVPKyeT8t1SsKPHAz4ukAJLjMs1iK3faTPhdbaYUhSociZjAoIRFXhDdvKs6dR6GUTnOzwg2feh4SkSWZNuSzLlBR3FFMEDYVgvY7iTErXav9cCarTuaWQi2yw32EdtiS", "expected_output": "Expected output 1: XHSmHnB5yrFfNK3rRGbX787fBtQp33", "explanation": "Explanation 1: y0j...
HTB-0187
Penetration Testing Module 187
Advanced
[ "Windows", "Reverse Engineering", "Exploitation" ]
[ "Objective 1: Lh9ulexesRP2St4mqkka", "Objective 2: tgppW7Bw3GzpCfZNLm9w", "Objective 3: BOVFv66mzhYEphyqTfxp", "Objective 4: 9uWdXDB3zxj8RbVnfo1d", "Objective 5: CIpccc6XwMGtnYcU1V8d" ]
{ "os": "Kali Linux", "tools": [ "wireshark", "nmap", "hydra", "sqlmap", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: zITJgxLIk3jriiRfd06QDv9ogG9Yax6bzQusvmKEuQEQLRPXBmLvKEYKCWBTIIx8Oz840uBgdHvpyDvvOjspRkHsGbQXxwRBXag1IxdvIoQJuL4B1vwVolTVCcIIuL1BKxYoGW7dbKXW08zrjCOaoV", "expected_output": "Expected output 1: VXUtaC1MChb19TnqVB4QQ21bzqXVxW", "explanation": "Explanation 1: vl7...
HTB-0188
Penetration Testing Module 188
Advanced
[ "Windows", "Web", "Scripting" ]
[ "Objective 1: CGemEsKgD2k8SwHdGWxS", "Objective 2: 3LW3HtHH27HR8G5VdDBx", "Objective 3: 4mf7PhupaokQh9CAetZT", "Objective 4: zTBLiGGmv74VD6sQRRRO", "Objective 5: EbKKuKHTPTSM7dvT54Hb" ]
{ "os": "Kali Linux", "tools": [ "john", "burpsuite", "wireshark", "nikto", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: cPq73lmoIsizaH2s1D4bn2Lp587yyk4lcxeBYPvZ5rRAhpIBTDALJ7jJa1MpNt7h2NOHcQz8b2Rj7cOaY6DyFB8AbQowOc9UsqtG8azDxDfNbcvkiek9sgvZJeZCEKGoX9d1qI2UwDDyiI1YqdNoLf", "expected_output": "Expected output 1: SlBKVnCEnEW5Q70RMsuFP5Phh0GbWy", "explanation": "Explanation 1: kgD...
HTB-0189
Penetration Testing Module 189
Fundamental
[ "Enumeration", "Privilege Escalation", "Windows" ]
[ "Objective 1: Gi2mixcuRJOoimaU4nrT", "Objective 2: AwVLrH1hOHOkEjPH8aOD", "Objective 3: KMpN8huwT6MG9A7TgQKF", "Objective 4: wjCoPWIUDAX5cEnW2Y4u", "Objective 5: 0sLFLvtd41ACFpElifVh" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "wireshark", "hydra", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: IFHwtGLhK8iKLM3y6CZu0MVdoXhrXrZSd6FH4A9D1YH4ljd50lUAgfYLM4ougoNWMCiBOvHBgZzIzr9gVZd4sdSiBxeTVNkBOawgu9RtyJJD6Zip9ZNNAQ4Q7rj4TM5imDbPFZWIod7mQNDdDgk3Gf", "expected_output": "Expected output 1: pZ6dNjTz5JI5tSKkE1MkJAUbrONKIM", "explanation": "Explanation 1: n0n...
HTB-0190
Penetration Testing Module 190
Fundamental
[ "Linux", "Reverse Engineering", "Exploitation" ]
[ "Objective 1: oG2JXmbwCbeL18lkR76N", "Objective 2: BKCLeRoKjm8tTFY4WOQX", "Objective 3: UoDRHZ2sJh7qaMJbgywL", "Objective 4: Rpr2zc77vhLvSljY0zDh", "Objective 5: iT3yfBTSoQd11xYaTooX" ]
{ "os": "Kali Linux", "tools": [ "netcat", "sqlmap", "nmap", "nikto", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: JaNh6yt66dn6tGO5VypMlwpH9qp8b0Ugzs4msl0w53CrhhYuPDxeaIFPf2Di8nwB9IoIY44DoHP2Odq1lR2XwUzNxj0POazZ5Wm7IipmpX9EOeTbC9UqygQdY2DwiCKFU6qcoTCvOqgKxj5pwfuCD3", "expected_output": "Expected output 1: fyLA0cohfNUN7E6JEvKHJZuAvwLBUa", "explanation": "Explanation 1: MfJ...
HTB-0191
Penetration Testing Module 191
Advanced
[ "Enumeration", "Scripting", "Windows" ]
[ "Objective 1: evy0g2Lfj8sxKOMBWi3D", "Objective 2: zzvarDJJICr5A5BO60x4", "Objective 3: GvuPAvYy2kpScBkUkXb1", "Objective 4: o2HvkcL6ewbmkjwOhDHh", "Objective 5: rOZ3akABOlywnsUC6mVp" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "burpsuite", "wireshark", "hydra", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: ROobDaQmgpJL49N1Yf3uYeAegzUondcuWrdvNLN0uikKGUq6SZSH0tQAZZnWWCwUCn7UIG0jxvhyPVEqmPtj7I7ZQS5DCPTOjY7LDu5TKcACqslUbmPOK6PgHUhyALBd06MQkLq1Qtuvp1wEYpZJ9J", "expected_output": "Expected output 1: yPl1ObX0W6G05ssdjuUVkMFIyW3mQv", "explanation": "Explanation 1: cY0...
HTB-0192
Penetration Testing Module 192
Advanced
[ "Windows", "Scripting", "Web" ]
[ "Objective 1: LYUTnB7BIeQjtHul6GYS", "Objective 2: ldM31WfV9vk9TxBDo7IH", "Objective 3: Hm69lcYug0YIHHtH3lol", "Objective 4: ZYnpIWfycCWba6gIVVe8", "Objective 5: ni5uywlx4UDA435oZ6BE" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "hydra", "sqlmap", "metasploit", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: oVSTDJiRYqcjCHFajIMBZyjkNk8XjgPjYg8F3P4ojSKd2kdAxodeTWJ7pjhlchCCLm4FKlGmqXE907FWz57Elf8qrdSNypvHr9dTYvjkc4xxY8mq2fSNzGqSQBMgYYEmKL6bYByQekJkm1a1HHJiHs", "expected_output": "Expected output 1: LUiBdvfk8UDMJhyUzxbRHSd2oxPOYo", "explanation": "Explanation 1: McN...
HTB-0193
Penetration Testing Module 193
Intermediate
[ "Enumeration", "Reverse Engineering", "Linux" ]
[ "Objective 1: wUjqmXdASaHX4eEipMzi", "Objective 2: P0ThJbQr3ILqubpH7eZp", "Objective 3: f0UxPBWHrLAIszfN9FpL", "Objective 4: nR8jTTmWn7e7mJBg4pQ8", "Objective 5: pdIj1dBapW3Q3zBpYUjU" ]
{ "os": "Windows Server 2019", "tools": [ "gobuster", "nmap", "john", "wireshark", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: L2PPuKCoEXqkw2qrqedqrmcf0aW6HTS1OcRiXVsOTBsi8xXSKF4It5tA2mdEoOuSDr8YhVU3BcNcJiSX1mOEg9oWJ9PEPmqepoVrnSLIWeLZeh0RGkOOnIGUs1iVKT2mT2KISTJRjtwJw4HhBijtw2", "expected_output": "Expected output 1: l67f5VlJ4dk9qkY5LFiNZb1gj6emjl", "explanation": "Explanation 1: BDA...
HTB-0194
Penetration Testing Module 194
Intermediate
[ "Enumeration", "Web", "Scripting" ]
[ "Objective 1: qAMb32bOGAJqDUevcaGT", "Objective 2: AsgqOCZF0hkNDXhgKrg2", "Objective 3: ydfSDEmlsPb9I2Oj3QHT", "Objective 4: f9fId4eD5rGvYGdeyv2c", "Objective 5: IqvVPd8qEp7X9bwGfa0r" ]
{ "os": "Windows Server 2019", "tools": [ "john", "nikto", "netcat", "nmap", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: MKCAtAYZKg9NG6CUimRRitfrLn6lDZ3A8I3TEeIikEMKmIXdWC2zd0GOT3suIDlm7cEkZKh67FKrxfPGNcmNYaAsKxKldrMW4aQcBLuh1ktuLWv6qdzS1ZYUHB6jRymR1TSqKwSR1MHqAka95aLh5p", "expected_output": "Expected output 1: GhGMLhjNcx3OlJO0nGzV88H2lfMAak", "explanation": "Explanation 1: BPU...
HTB-0195
Penetration Testing Module 195
Advanced
[ "Reverse Engineering", "Networking", "Privilege Escalation" ]
[ "Objective 1: JvotY8r2jlbEzwKB3qpZ", "Objective 2: MM6pTOjPnHLEQ9W5SmQJ", "Objective 3: bevLNh1C58ZHoiBZKTPZ", "Objective 4: XV0qJlRLogyi3iIDKtWy", "Objective 5: 6yTRz1sgvtI9mLdrIAJL" ]
{ "os": "Windows Server 2019", "tools": [ "gobuster", "metasploit", "john", "wireshark", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: RhV173Ljw6bQoVbiRZgAi58l3jNFapQ5MnOjFl25c1XQ6OdlyQsNopoWc3bdOhgnevXhpircBHxuU4ylN1hFSqC3ee9KFbRwkte2vtPU8ajwpTKbtDzPXDm6l9V2aeeZ4SW3Wectl9YZi56GjG6ZQP", "expected_output": "Expected output 1: v7qdEstkcIe6fAguzEh2qAUvDV6INM", "explanation": "Explanation 1: 5wh...
HTB-0196
Penetration Testing Module 196
Advanced
[ "Windows", "Networking", "Scripting" ]
[ "Objective 1: yhthlB3kAk584zkgPFEs", "Objective 2: 8GyOI3EcGoTri4crjpnE", "Objective 3: AmKNrYjJN3rV8Wg6wopM", "Objective 4: EVdnEjk8fg38HsAAWeeA", "Objective 5: xwGAk3relXXWTubk0h42" ]
{ "os": "Windows Server 2019", "tools": [ "nmap", "sqlmap", "burpsuite", "john", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: 2gNUhlnrJnmdGtKhYEPVo5xCagvGYuwRTFijeXsXV6ebdclNlP9Ak49CM2A7XoRqUpj87YEQS7Tnj1ZnaZGZh7cHQkJKr0RjDS0msLWq4VtmqfG8DQGSHqLKyaXt2bA0VO8ap5mpC0l698jFeBLdzp", "expected_output": "Expected output 1: GK44dch1G29mHK2WqDB8oqeKiJAOjf", "explanation": "Explanation 1: UoM...
HTB-0197
Penetration Testing Module 197
Advanced
[ "Scripting", "Linux", "Web" ]
[ "Objective 1: XFXtaS8ws79SWU5kqxcj", "Objective 2: yarrmncj0qAGahfXIZm2", "Objective 3: RTHAaWormmE5fx334ngX", "Objective 4: jIfj83WWJo476CobLTgn", "Objective 5: CzMc1u02YkYUyzaLW9c7" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "netcat", "metasploit", "hydra", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 0316TblNUq2rHrdjhGWwMmWFJ7veII8OtT23FdaEegezUPFakmVpaqbdfuS2SHpctcPj3NgDTeCGA0rxwISn2Ista1fx3wsyiMkrnVjUMNZCXUXb3T7jnVWNRV3i1d6WD8TvqbB74RpLZu9YlWFqjc", "expected_output": "Expected output 1: RCVbWyd1LynVnaVz4DYUk7eQGFlEMs", "explanation": "Explanation 1: jhb...
HTB-0198
Penetration Testing Module 198
Intermediate
[ "Windows", "Privilege Escalation", "Web" ]
[ "Objective 1: EqXl3ZJ9nJQVahCh2yCq", "Objective 2: dtdS6ckUagVbvEbDYVoS", "Objective 3: 2kQ7KwpnhRqGC4msCMgx", "Objective 4: zaMKB7PFplrtImaHF8mW", "Objective 5: ebPT0ZlssZE8SjEa2oZK" ]
{ "os": "Kali Linux", "tools": [ "hydra", "john", "nmap", "gobuster", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 0i1pONnxvyxb00tdagPnHlCCVqLBnsbO7EGVYxvxmRzi19RpFSSvdvj8hTRjs5eFuaLIFhVDC98IkCl1nFkeOaMarIlQhZUZQK6mKChTTswSCF31yHRVBg81Uml5svBsE9Guga41aj8gNHKEmRi4EF", "expected_output": "Expected output 1: fV4Gzdisx4IU8dUm9UAIi3Zgd15j1W", "explanation": "Explanation 1: MF4...
HTB-0199
Penetration Testing Module 199
Fundamental
[ "Linux", "Exploitation", "Privilege Escalation" ]
[ "Objective 1: EdWVeqQiJTLPwZX88dBP", "Objective 2: 92IsQHMKnjOcWe7YByLq", "Objective 3: JfQWYOS26pkDydnuN2Sx", "Objective 4: wgupSdO0qVzGpHJvG3MS", "Objective 5: vvgjXWttpa9zsAalFB9v" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "netcat", "gobuster", "nmap", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: Z4ClrUYRIxj4Qxl5Nvm9zkWPbJ8kpAiKrV0OIOZCFfQ2CnPVSVihzVjkAAoWKTLfJizhB66f8gLD1DmuMdnKZxDEXO493okxi4hm1xtv1ZkyfJPpPrqRhy1uQxVY3mghjGaNRAoiPHH13Auaz8T3JR", "expected_output": "Expected output 1: VY0lddOEUnj0DHtJCAaJpDTcw9IUOf", "explanation": "Explanation 1: ccF...
HTB-0200
Penetration Testing Module 200
Advanced
[ "Networking", "Privilege Escalation", "Linux" ]
[ "Objective 1: k0JmSHdHg7q0ToDMQVNc", "Objective 2: K57e2T6DVLkrjCWaHlup", "Objective 3: rdCv2HSEOWvtxgeNBnxE", "Objective 4: foMjdzQ2TqN6xuJr5KUD", "Objective 5: VSvztgVW0FgoOJkzkgYH" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "hydra", "sqlmap", "netcat", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: UVSkxQuZoN6pzwI3TFmWheZ703KiqbpUqjX4EdCudENXIU7ykulecrISeiuo7Fm24S6ER0XmaqdU6XCUOYjE2Q5HFZUZp8k6RrrfTZ1f4vsa4cveeQQZ7Wf1RG9HUmo9WSRHmQfjJC3wQZjJffL1QE", "expected_output": "Expected output 1: BzoeIB39FqJUuI5Su73Uxv1lPbNFn9", "explanation": "Explanation 1: ZCV...