module_id string | title string | difficulty string | tags list | objectives list | environment dict | tasks list |
|---|---|---|---|---|---|---|
HTB-0201 | Penetration Testing Module 201 | Fundamental | [
"Scripting",
"Exploitation",
"Networking"
] | [
"Objective 1: mV0AsKksiCmoTWHW1BiZ",
"Objective 2: KXblFOxvdIJtjdsViU5l",
"Objective 3: k7E3vF3sVHMmrQkTgD0v",
"Objective 4: i0medn8puWW1TRxqH3Kg",
"Objective 5: wEaGKPahAwBryfiG2k20"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"john",
"metasploit",
"wireshark",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: RsAy1gRgkRubdkt48XKqYFJ0zXnjXGiSHYnZumD6s1y051xqPuAKElpsvxT1TDUNWSoIDcnIRW91IAzDKx8Sc4Iv6FyecH5Djt1icszlwXSvDy6NPNQCmbcVU2CHHx45G9I21yCn0dbdcxAygqCD4A",
"expected_output": "Expected output 1: JsxNWiqcXcp176pXj08osN1ui2KjjK",
"explanation": "Explanation 1: AzY... |
HTB-0202 | Penetration Testing Module 202 | Advanced | [
"Networking",
"Exploitation",
"Reverse Engineering"
] | [
"Objective 1: DrBY424jQbnrJhNIrOdj",
"Objective 2: 7WIGUSKjlYO2ymqvPqVr",
"Objective 3: 8HzdY2XZG0OKIiCrdNPt",
"Objective 4: e3XtIKTtS850UPa7gMu8",
"Objective 5: OaUWCkjUBUfGLwVsX1Rc"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"nikto",
"gobuster",
"nmap",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 76Mv6hCRhnFhwn8uKMAOA0SnAJ0NdnEsnwhQt0Rqe7NY9aVLMqK5QQ3OLIFmYiCmjm9Lhm1riuEOvqLs6WO2WRdKR5SJN6GgWtjFo0wM1IN2jorVNvNX4DdE7QvNxhbcpYg6flU3wZyhVFyo1cT6G3",
"expected_output": "Expected output 1: 6ZZe9JtgRu6MnMwYKX4r5q4qLXPJkP",
"explanation": "Explanation 1: QQF... |
HTB-0203 | Penetration Testing Module 203 | Intermediate | [
"Linux",
"Enumeration",
"Networking"
] | [
"Objective 1: xUWN5Sgoj1lIrE9ORGdA",
"Objective 2: YfysXcge47y8korSZrkr",
"Objective 3: DWCi2lgsL0xArAOJpEb7",
"Objective 4: U2mnHRE7g1YXDQFLSdJE",
"Objective 5: hMOokwWD8M5l2sqkHAkj"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"nmap",
"netcat",
"metasploit",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: CBKifuJOPRolabViyizZDwUhvujOwtS44L1rtkXCq1cnjhJ3TBrQRuakxOldvLjZ07aeg5FPLVZZvDnMqN1t7s3UMzcxcwBpOqfwYaaBi2nDgZn1pwyMCHJvkbC9AcrdT4PN5rMEWhoOv9i66caWio",
"expected_output": "Expected output 1: MpMsyiVBQEGED8MNMaBA20NZZG8ana",
"explanation": "Explanation 1: JXQ... |
HTB-0204 | Penetration Testing Module 204 | Intermediate | [
"Linux",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: z6XjwORY4EQJ8RbBM2kT",
"Objective 2: sadV5dxU31BGfya9G7yz",
"Objective 3: yA1M31TULyzt0j8FKls8",
"Objective 4: jaRQMmcVrc6ydGfpkZzh",
"Objective 5: 0HhxzGXSqb1hAg5BPXIj"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"nmap",
"netcat",
"burpsuite",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 9nZY5WdtvmKwHgcqIdMMudsRz4wbArcwqULchOOB825680U095WnPmX7RzTCkZWQrySezjnSpJAU78OifPwURCySW2rkhg2ymiCivnFH1FmdnmpWYppssBUfi2ih0g90rBeE6hBb6qQymsBLrpnYvP",
"expected_output": "Expected output 1: 0FSXWpcQUHZBPg3FReouHrWUWvUs0N",
"explanation": "Explanation 1: EsE... |
HTB-0205 | Penetration Testing Module 205 | Intermediate | [
"Scripting",
"Windows",
"Linux"
] | [
"Objective 1: vRhiNeAGluyMb9dubxZR",
"Objective 2: fOdZoC4jUej4bk0Nncdx",
"Objective 3: ii2yrDf30XyvZOqSVvJR",
"Objective 4: WV8uI2ta1JDEdh7pI3IM",
"Objective 5: 5T7uSYhFTLJ5kzwWQfH1"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"nikto",
"sqlmap",
"wireshark",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ix49UNjty4kB0UWgoElgjePaDl3r6OoKQXhIMxY4VrSwD4ocw1AbunvxHzHcq7PnB699jUjgIqXRHVgVRc2gQhxAViANlSVFYEzIIykfKwiNOcPTKdQ8sXDCXrLdTJWB5LwH5aRyogPcWxM0wESM81",
"expected_output": "Expected output 1: F1AajdpSZAFrz9I7VjOY3garUP169C",
"explanation": "Explanation 1: f8f... |
HTB-0206 | Penetration Testing Module 206 | Advanced | [
"Windows",
"Networking",
"Privilege Escalation"
] | [
"Objective 1: 53r8wFg8yhSrAIboY8kV",
"Objective 2: PJsPM770tr6HZ8ZInk12",
"Objective 3: LsMdCOapECdPAeARgpdX",
"Objective 4: 7LNZUEnIZ85qeI7y83xJ",
"Objective 5: x7J7kQbFJiNp7pHFq3uo"
] | {
"os": "Windows Server 2019",
"tools": [
"nmap",
"nikto",
"burpsuite",
"john",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: YNgEh08fyJNgcjdqaRwqp2pPh4ZEL80SWe2P0T16MpH65tVLLiF76KAb6zP9nL3aXyqjciR9vyqIBfLFHbmwPVjOmi6kODPOmDXJLag4Ab8rzox76J2ZpX5kDXErsaee8Fo9wqMvWsrq0HtpX8kYqN",
"expected_output": "Expected output 1: CQNjsR08q6bdwQ9G8Ab4p9104WYJEh",
"explanation": "Explanation 1: pZh... |
HTB-0207 | Penetration Testing Module 207 | Advanced | [
"Scripting",
"Reverse Engineering",
"Exploitation"
] | [
"Objective 1: GcOGIrfMf1J4YlLXLhIo",
"Objective 2: PLWoYXHlX2WZjNTZx6iX",
"Objective 3: wcVHoNfTwpG1RP27GzXk",
"Objective 4: ldScdSIV4iVMct819yri",
"Objective 5: 3H4QA4piE224ejAXsIcg"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"gobuster",
"hydra",
"nmap",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 1h8c02rcmrN9nAnAfY7jDyWDfozlhBXB6KEHsBUh04fEntEgyOBo7366g2av59EMUIwQLHkkZXAfsqw8dnIOaUlZZ77LVYoBxKbvj9EqEr3fQbHeyZHllqNTW84ZFMMhNWH3TDVjNRReshgXgDPuFK",
"expected_output": "Expected output 1: iZ9RvSDmPATNgV2FlF8s6WgoqZY0P6",
"explanation": "Explanation 1: iy8... |
HTB-0208 | Penetration Testing Module 208 | Fundamental | [
"Windows",
"Linux",
"Exploitation"
] | [
"Objective 1: CR5nz5Pw9KBoem9dyAQC",
"Objective 2: glWi3k0ZamuFs0OnNZJk",
"Objective 3: D3PYJ6Jb19zW1lttzbuc",
"Objective 4: KRKMz3mFYxYq1C2vXMaQ",
"Objective 5: mQhREo8EEN2R2eBcUr31"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"hydra",
"gobuster",
"nmap",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: MJLRDlFt7BbtF0Ovi5bw45KQxCvHQsA9csc6U0KLGlS5MHcqxX65pUxn7J9auhgdqp3WN7N92H3iuMmBnJ1xwCcptq6fQp6oKBixV1a4E2zwekDsHGXdhjKmM1BqBfPJZshIGYilGiUcMfiQITuVfl",
"expected_output": "Expected output 1: PxeUwJuXyXjVetnh3nkZobX9jW8rXT",
"explanation": "Explanation 1: KGx... |
HTB-0209 | Penetration Testing Module 209 | Fundamental | [
"Reverse Engineering",
"Enumeration",
"Networking"
] | [
"Objective 1: CMxGQNj8GaWZeMzQwVlo",
"Objective 2: tj5KSydh9lwaTlDjLDJO",
"Objective 3: APIezRLaQ3ZDfXHDho30",
"Objective 4: rVyC8Xv9lTHE0Az8Ik3G",
"Objective 5: 3uAXwcQjBI3ECj8HQ7kU"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"hydra",
"sqlmap",
"netcat",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: KJyEES6o8ASB712hgP4GRKw6lIvM1lONdwGMVuL6WcU3XQxEuz4VLNtOejwPZhpTjTec4TxTFFkvHXgZW5oqXkQ4D79Ds7pJbhsavA0DFpUnlzcJsWZzOTtDKw4q2N0FvbQX9REYojFUGkvfyYP0Ko",
"expected_output": "Expected output 1: J0xr91Hsc8AQQowNQqCkWfgA3VtXXV",
"explanation": "Explanation 1: b0J... |
HTB-0210 | Penetration Testing Module 210 | Advanced | [
"Exploitation",
"Windows",
"Linux"
] | [
"Objective 1: Ca81j3UrnJpwazsKJZiU",
"Objective 2: wasQfRq5c35oeyX5EC3i",
"Objective 3: nVz90edqkZ8j6dJZux7r",
"Objective 4: 4Hx1nKhy3cTsqUVViHfg",
"Objective 5: a3zMajmOHjKWzcAhzc6K"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"wireshark",
"netcat",
"gobuster",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ezZHetoY0CCv5aty3zx8Y84fjaX67PZtpSNEfoheCeahS3jYxJlbMuNRSmPtkwKTO5rLeUVnkDVj1afSqmcZgmwbtDdjpcxyisD2lMH76pns0eiJ3uzFKCwfSCWFZFNuWXnkxaVnLdk4rJg1JM1KY1",
"expected_output": "Expected output 1: 9AnT14ZealXFAE01TypCStCPMmNToe",
"explanation": "Explanation 1: hLn... |
HTB-0211 | Penetration Testing Module 211 | Intermediate | [
"Enumeration",
"Privilege Escalation",
"Networking"
] | [
"Objective 1: uuf0m5ZjkdMC4kp5z6Lu",
"Objective 2: 2MlJvD9JV4CI0xtMNxm6",
"Objective 3: eH28cGBxPzD4xECdqmd9",
"Objective 4: 2pO6it7FrqD8w6OOt24c",
"Objective 5: eR3o4E9q9UcuWNkFfS0E"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"metasploit",
"hydra",
"netcat",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: XRVMFrAM11E6ZYpDlbvVZVpCua4FDBpE3yjU4tdYEzxELEfEsSNOEvfz35y8tftBiCcoaIKenclWRtOWBVGan8uL5Sg7Qz216SZOve6Vnqb5id4TrZBfNdZS3CFG1RxGEQzMLxUEMAjJO4sR7H6Vyp",
"expected_output": "Expected output 1: c4UYUhfEp8miTSutSDTHe3RjgyGhlp",
"explanation": "Explanation 1: BGb... |
HTB-0212 | Penetration Testing Module 212 | Intermediate | [
"Privilege Escalation",
"Windows",
"Enumeration"
] | [
"Objective 1: QV99M0NRVQKwHkQlZYqF",
"Objective 2: goqYCsqLHJQJ8UU5etm5",
"Objective 3: 3Cjav6fm55McRHs1JjIm",
"Objective 4: wN7gyTnkpr3gSx5O9OTt",
"Objective 5: DhF9T3FcEhhf1azHrSpb"
] | {
"os": "Windows Server 2019",
"tools": [
"metasploit",
"john",
"hydra",
"wireshark",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: tGGL0AY1GnwPcQ86WJIWDjvqTgYFjUxKEr6B0VgBaCo95rVzLmjaqHfxDlhpSJr2B1VRJ2zM7U9X68pQonDSrUJXzMtyWACwtne8cSNpL0H2JmhfbYIuS3uJSu6Mpm7b3uXnbxyWVCSdYe2y9ZY6g8",
"expected_output": "Expected output 1: 2XRosE8xckpz4SKVaXjlDzMEFNGqP7",
"explanation": "Explanation 1: bxZ... |
HTB-0213 | Penetration Testing Module 213 | Fundamental | [
"Privilege Escalation",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: d5VPwrQWpvu8BIrfvIKC",
"Objective 2: NUyrR8MjttuBBitu9cMz",
"Objective 3: jY6P98LBk6Ykmw44LHk8",
"Objective 4: pxL5X7o7nMV8hNCbBMcx",
"Objective 5: N2wOl9S4OuektWBkKpgs"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"john",
"gobuster",
"metasploit",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: UniLgbJ0mW3JN21S7DGjZdHeVyNCoN9sr8SjWk01NrOyXzMu2JpUd8GCjWoF96GV67DRwZCN2mheeFfxd74e9VthFgnGLkjDHmzy2VOUOmPkDSj1u7Z87tZpiRtQ3yusNuToTfLj6gS9n3E4S3RuBR",
"expected_output": "Expected output 1: rBPU7TLsk8Dz5F5TPyW3tUQxqBZtjW",
"explanation": "Explanation 1: ibe... |
HTB-0214 | Penetration Testing Module 214 | Advanced | [
"Web",
"Windows",
"Scripting"
] | [
"Objective 1: lJPQhC3ruigsSJNWrhxS",
"Objective 2: tiAy97bifRoaRP1TubRY",
"Objective 3: xoamvheS6jnI5hVPq9hS",
"Objective 4: gTqgXsB9wgFNlj4IE2B9",
"Objective 5: ODf33nDRuBsmtuuGX6TC"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"nmap",
"john",
"nikto",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Y0JUwwHfi9u2mlFGzoh5r5L2G1j4jzLivUcDYyI6vqn42JlpzdXLDVq9WMy3Fh3VILNUx2ZclZKQB9aeWeUZVXXPqoPUxHgORX8wpphCKB1mykLxbsuSEekUbSs4quTvVu9jCRZ6wakKccxzsdpmr1",
"expected_output": "Expected output 1: nrT2yoGMCt4SYlGdf1HDre1bezkAbF",
"explanation": "Explanation 1: x0Z... |
HTB-0215 | Penetration Testing Module 215 | Fundamental | [
"Privilege Escalation",
"Linux",
"Scripting"
] | [
"Objective 1: gvJhhAVuVsu7IdtZ8Lwp",
"Objective 2: NdOV4tntXTqDUrN6fhQl",
"Objective 3: dXehL02K7w6JhOnFluwj",
"Objective 4: X1aYIBexY13j2BKLqC5m",
"Objective 5: adW2XL29HZLkqLKcxoll"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"metasploit",
"john",
"sqlmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: rYqyxRiUrVXTyyZhZRoBxhWkHfo8a7dpgg70N4Mv2wL63M6NOr61usS5Doue0aMwInqBZ4ZFzxkN1HQfwNP7zLG9biCNkatqhVRDipl21Aq3yq6x3kF88t3xGBweaSYbLBn5RJgsh4B1NB32GXShcL",
"expected_output": "Expected output 1: eKigXKZQwbo6oJf9R9M0V69cv49aO3",
"explanation": "Explanation 1: JZX... |
HTB-0216 | Penetration Testing Module 216 | Fundamental | [
"Linux",
"Enumeration",
"Web"
] | [
"Objective 1: fdvVPmfpW3SrjxdHv8GY",
"Objective 2: pogNcjySUB1xHqONFxXn",
"Objective 3: 4WhoqJsZLA4vMxg8Smof",
"Objective 4: E1j1wMdX0XKWyP5ibTpf",
"Objective 5: y4SfWQLdEXWt9WQ6qWAe"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"wireshark",
"netcat",
"sqlmap",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: y9LKti85SuLu3kVKrIn0x8moRMH0RaE58a8aOL4E9mM1Kc2kvQvR0eBuR4lneEPrRg6Q15DNj5ZW3Wef55FqowLhlfdvZW5RmOirbNIIsaGVyM24pQ37hf5x0CaUElgv7lsWBfjjzaDqClG1Vt3sry",
"expected_output": "Expected output 1: VO1ivB0YLLfIGk7YcIwbLLsCThqDHP",
"explanation": "Explanation 1: bQA... |
HTB-0217 | Penetration Testing Module 217 | Intermediate | [
"Privilege Escalation",
"Web",
"Networking"
] | [
"Objective 1: MGzaObErWJKj84fgU0H6",
"Objective 2: SxKzyshKhifOsZr2hJP3",
"Objective 3: FkVcB6qS5Jkk6JLhFNfz",
"Objective 4: 2GcsDqUDI393SXMVLq0h",
"Objective 5: Ce6QqaaXhDzVTb1ZwwxV"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"sqlmap",
"nmap",
"john",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 7Q9kLcIfRYL7H5lZJkCCcfZIhtoay50LDQRtDdPnVOMYllAIhm0FTmj7ABEUsLJ22Dkzgyvecrnn0dutxZ61425aSuXo2Tdp929bxnKF2ow9nqUKZtmj9pHQJ6yCyBfYi7aC1pdxIiZbL5S6K3Ul7l",
"expected_output": "Expected output 1: chNwfGpwuqZRClBr9jUFJhsYqrR2v4",
"explanation": "Explanation 1: ZLS... |
HTB-0218 | Penetration Testing Module 218 | Intermediate | [
"Enumeration",
"Exploitation",
"Web"
] | [
"Objective 1: yZThxldqMUIQXArv5DHe",
"Objective 2: 4aWP97pgmZpH19tVNT6K",
"Objective 3: 6Ccm0r8L8nmKx4EhXtxa",
"Objective 4: KSHPiQWSyzllE23CCUPU",
"Objective 5: xmZx0VJtouUULOk0jX8r"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"john",
"nikto",
"wireshark",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: YN7fWLvTc1hzC70y6iKrhX4iGx43M8vrnyPJTDysFcKhawuxRB6z5gWSAruy07DlLXuxoTIvxGlj9e7OjiBKaTzVoWsnEfJkR7TyKLjJ4495UiPpNmnI2ejS0LGvL78ILcyRrKV8VgWIsCjico80jj",
"expected_output": "Expected output 1: Oh1etge3JNVvNjA4bBiPzZf2SWZqMS",
"explanation": "Explanation 1: 71n... |
HTB-0219 | Penetration Testing Module 219 | Advanced | [
"Enumeration",
"Web",
"Reverse Engineering"
] | [
"Objective 1: tmL60hxBYhY6vjLDFosT",
"Objective 2: tLwzm31xA5Jxi477kJB4",
"Objective 3: WtX72ZmV2DHIL2TFyQHI",
"Objective 4: HSofCL31aP8BBpA3Kw2p",
"Objective 5: u3hOzJSqbO0y5JGjoz2F"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"metasploit",
"hydra",
"gobuster",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: qw2DkBBV5Q2FsS5plkmljVTwDmd0x1bmvfkjONQMLIkwPeZ1yar10UKpqVg1IsQOI7SAlh3lJUFNJHDStLJ2TIHtnuh8b2qVzaolBssZD9duV7oQ2EvojuzqQH5pIMRp0s8gBwspLfy26zO2zLsXFz",
"expected_output": "Expected output 1: s3jtAL9SHYXnochZ09LxzV1dh0NVy7",
"explanation": "Explanation 1: sgj... |
HTB-0220 | Penetration Testing Module 220 | Intermediate | [
"Windows",
"Scripting",
"Web"
] | [
"Objective 1: 9icFRNOWYZaatPs0LEJr",
"Objective 2: lofN4DNGArW2ulUzq8N8",
"Objective 3: M8D5m2MrfZGlq1uuXstP",
"Objective 4: ePFsnX9RQuNysRs7r9o5",
"Objective 5: QWbXjXMinRhXk5KZOYfe"
] | {
"os": "Kali Linux",
"tools": [
"sqlmap",
"netcat",
"nmap",
"nikto",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: kFVqmvltfydKdPdOXghC9nsglUZ1c7AkXw8QvtxyB43nMH04njxdOjRNM0VTYf6zeBPeKZeFt4XefdlJamZvAyjyuiei6g5Hw2WT0O4BKvgNUdCe5YgM3L5XXssemXLbUqjlM6XyTrGN7Vd5s6Xolp",
"expected_output": "Expected output 1: F3bRNr4CNWc6A2mKyAnhHfTjCnpwBB",
"explanation": "Explanation 1: KVj... |
HTB-0221 | Penetration Testing Module 221 | Advanced | [
"Linux",
"Reverse Engineering",
"Enumeration"
] | [
"Objective 1: Qo89igfvhOiqQsJX6gya",
"Objective 2: 3zswyQcwV1pGRjMdpjc5",
"Objective 3: R3OVhaSPzp2XYcUdHcu7",
"Objective 4: CkBmu5hQWS6DzNH7QVhG",
"Objective 5: ouVfOSeNs1U8YMuEr9vX"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"gobuster",
"netcat",
"burpsuite",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: rOUxiZNg0M458ZnW39yqNbUKfl5bU72Hh9lZSE3L4COOOyYEtqFzDGOUksXQgfmnY9Y31CaBoEYMOjMQTnfUX3Rul2OgstP5bu8gXXp2uZpQn2zhdB6zaCeWSCZ3o7nqsc2JIMWTpHl3OmqktUlX7f",
"expected_output": "Expected output 1: 8SzvR525sucezgU2SfBncrbdGNUYXp",
"explanation": "Explanation 1: Nw1... |
HTB-0222 | Penetration Testing Module 222 | Intermediate | [
"Privilege Escalation",
"Reverse Engineering",
"Web"
] | [
"Objective 1: 9RkbX9Jib3vb140MVota",
"Objective 2: z7lBxHRg5SHFBN5kHVRk",
"Objective 3: xjrwd6AJx7eTmKD2fuah",
"Objective 4: srhO4VK22165RG7NLkJ5",
"Objective 5: qXRkvMZ2fckqiAqB4AZL"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"nikto",
"metasploit",
"john",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Bv3vJCnWeTttKRzSdVwrCljgIPczxJVl1IcO9F0ykWrYSs9oaXVBIV1e4D3sBLn1kuGxmN0gk3SljpWGvzvg0H5LUfUw6lPflYDww3SkTn3Q8jP306AcmB41D4yJEaedOvlFBWuYlxnSpksfX6z4rw",
"expected_output": "Expected output 1: qFBvetu4Qlth112WvoC64qWjasG1yD",
"explanation": "Explanation 1: kgD... |
HTB-0223 | Penetration Testing Module 223 | Advanced | [
"Exploitation",
"Scripting",
"Reverse Engineering"
] | [
"Objective 1: IvqQiSKpvanllyjhqknh",
"Objective 2: 03i5vyqeYOU5P6ayfgzi",
"Objective 3: ZFDfPZMyRsMwN2cl17sV",
"Objective 4: lu4KMa19gRm7XeZsmziQ",
"Objective 5: f60oP7HsHO8ra35Nyyp2"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"burpsuite",
"nikto",
"wireshark",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: m9Az6HJ1CFETeDnuliVQ99M1bTVA8gSb4GJb8DvekEoVpkXpMS1ZQbMWSRMIEKBdhIXpfoD75jwA6Cbuo0m1e13scdKG9UfifsfWOxuziqCCGWUQZ0ZLQ6Fs8SpA8Dv1jGDuTPpvhiW7Dkc1nI0qpK",
"expected_output": "Expected output 1: D7sGWXbA9QgxBToXEp8qoBpPl3szwn",
"explanation": "Explanation 1: Vpj... |
HTB-0224 | Penetration Testing Module 224 | Advanced | [
"Privilege Escalation",
"Linux",
"Networking"
] | [
"Objective 1: 3T7jgM1L6oBg7Q5k05dH",
"Objective 2: p1QInrqJJWae1koiRlRL",
"Objective 3: iFbCkYANROGmeX9hNveL",
"Objective 4: lWpGAK8I3wWwhDlPTCJb",
"Objective 5: StNPl32KIJZtC7Qe7Qkq"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"john",
"netcat",
"burpsuite",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: PGIGHEpXEZ05dVVnYTjAb7xajxV4RdygxGmpkmi935xJSzBvrRXYuqAUd9Pj1vbwOpf7dIK7znPO9tuOmPhS5kMPmlwsYJqKz2FthvvJRecMShoKqoJodcFEzBQIyJ7L34TsOni4ccErYclova3E7Q",
"expected_output": "Expected output 1: Wl212K4OiZQAcdot0stkwkAh016kNh",
"explanation": "Explanation 1: yf8... |
HTB-0225 | Penetration Testing Module 225 | Intermediate | [
"Enumeration",
"Exploitation",
"Privilege Escalation"
] | [
"Objective 1: t9eLC2J75tZyZ4xGfOxU",
"Objective 2: p7HWVRbn8a3C9hFgq52n",
"Objective 3: LxMLehRhwtEKQqfwPXBH",
"Objective 4: XVZ4UBlaOvSMBz6qf2dj",
"Objective 5: zg41BNU3IsQp5XlTWwmq"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"nmap",
"netcat",
"sqlmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: oBgj9VR2tKpO074lZmEyYUOKKSEUJAQzWCT5RnSYxq0k9LLxGvcursqMfpsCtpPSv7vRUQRVfD4s2mOKN60pX5UVVBdcRn6kX1Ne2YXrhxSd8fEiUH38z3HWR80X7ZjnAefPuWChl3F1ViRR0xtfJs",
"expected_output": "Expected output 1: pzn4h8SHUctDP993UEmLwjIDFFrMyz",
"explanation": "Explanation 1: RlE... |
HTB-0226 | Penetration Testing Module 226 | Advanced | [
"Reverse Engineering",
"Exploitation",
"Scripting"
] | [
"Objective 1: 6NbPSygQmReTPRVNggPx",
"Objective 2: tAv4FPQPkxy0Bcjmln6w",
"Objective 3: 362kpEl0v0Z03K0lrNEi",
"Objective 4: R8OzQqpxUZe7s3ZVIZTg",
"Objective 5: DEGnn1FAvJ7yDTobpWxG"
] | {
"os": "Windows Server 2019",
"tools": [
"metasploit",
"netcat",
"hydra",
"wireshark",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: edKe4qacEhyGqGg0JKGzrrPtXksJTTSS9uk7SYxnxGdO7vu9zj58PZ7EFFmag4HBHwK17xbarSO8GIDCjfnJaPQtsBzBxc2gdSbpgo9R0Lz4g1qVQwqk6P25GoQFwqjNP0Mr9vZARAoCxl9Kv3oFYe",
"expected_output": "Expected output 1: 8Noo6TyhkrgE5cOQmRIsBb2969SRCC",
"explanation": "Explanation 1: 4tW... |
HTB-0227 | Penetration Testing Module 227 | Intermediate | [
"Enumeration",
"Networking",
"Privilege Escalation"
] | [
"Objective 1: 5exqLNEvrAmUYhUipUVh",
"Objective 2: Mm8M9p95LLsSlg6TgLM1",
"Objective 3: Hq0qaBabYwlZdcd2FiVY",
"Objective 4: cJp5zJU9JMgHGUUT7PlC",
"Objective 5: spctIcynB7yfEgOVi4TC"
] | {
"os": "Windows Server 2019",
"tools": [
"hydra",
"metasploit",
"sqlmap",
"john",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: HgBGyl8evlxOSQE5fSz1hpzcMEObfa3ml7C5zw41lKztmm1xbzOepEE7YVfWaHpoDcm8LiHJottPVAhKJvtt7UAHe0bZmPCxhysQrdV0q0RRuy5BzIQ60Q79Fp0PAwZltLXoxQ7AK2BG9INBdoZRvt",
"expected_output": "Expected output 1: Y3IAQgV4eEb8FiepQRMNY31CU7BuNl",
"explanation": "Explanation 1: daL... |
HTB-0228 | Penetration Testing Module 228 | Intermediate | [
"Reverse Engineering",
"Enumeration",
"Linux"
] | [
"Objective 1: DOHiljPrbdvBXYIaJsPb",
"Objective 2: y3cqv9DjriWBpdsMRgRi",
"Objective 3: cczYeIyb5Rn9qso8MAD6",
"Objective 4: 0cc0m7srEUpaUgIHS7Mm",
"Objective 5: mtuvQ4drj7hX4hEKPP64"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"metasploit",
"nmap",
"nikto",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: PY10vY6s3q2wkZa8MDvCfFKj13zpAKTw1lVsAw2qa15uzGXYEwm88ImvReZFvxd9zpiGnahNr2mVB7hd623nKEb3mh4CKYwKs2YoOuX4ZVP9w0DYlZ9OHMhuZ6IefQOvCBWMFNilKZw0ZYhE35z0NC",
"expected_output": "Expected output 1: dx8AAR7VxwBgCB4FnckfXaY2d4W6ND",
"explanation": "Explanation 1: XIi... |
HTB-0229 | Penetration Testing Module 229 | Intermediate | [
"Enumeration",
"Linux",
"Privilege Escalation"
] | [
"Objective 1: DvaqbjaEPYxM8IbCiRwJ",
"Objective 2: v3EjdEaXrMs9hnaCjhro",
"Objective 3: baZqQsmyjUedLuCTOS5Y",
"Objective 4: bAQg2Fisr2tYJAnmRlsO",
"Objective 5: abTEshJ2bStPvgOE6gBK"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"nmap",
"john",
"sqlmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: mtvtRQ03OJp3nEI3VQxceakkB65YQIuICxKOx0lfE0v0yYVUqsgPKMvacyixdVr6m6EduCnSh2kUzbg2tgPnpPSsXSiNZuy6bFPeEQJf5ASuMw8YpsVp2GYZzB6bwkErjvoJOuQZdjYHLXODjzcNlS",
"expected_output": "Expected output 1: mTP48kMio8GLKKYGTfICoitYFKGYbI",
"explanation": "Explanation 1: 9oz... |
HTB-0230 | Penetration Testing Module 230 | Fundamental | [
"Privilege Escalation",
"Windows",
"Linux"
] | [
"Objective 1: 7KGsbcQvc7tJsQANvMlV",
"Objective 2: nn2VVysc2IXkL6MOkWAc",
"Objective 3: TypQTmmLj2MXp6qbdJZO",
"Objective 4: pOP6jPG82VYBjjDXjju4",
"Objective 5: pjEeGzeA33WmwOnUDZKX"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"john",
"gobuster",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: IYAozAejl2yrmuJKp1fTuF6AIdvITzoR5XSf0pIMAq26NqyvRRswfSqivzlFKQEh61bMWZOXp0tYeKzMOcykDao5ZAyR6k5sL89UjyE8rB6FBqI1Brv0U7SFTyb19rqX6NZX7v1VmSxqwI5iMPYJyB",
"expected_output": "Expected output 1: m7sN4ZeAGZAMMfxSXUigvwGSl6fjI4",
"explanation": "Explanation 1: miD... |
HTB-0231 | Penetration Testing Module 231 | Advanced | [
"Scripting",
"Linux",
"Networking"
] | [
"Objective 1: A74GBYzBoG53As0l0OBx",
"Objective 2: eRL1lcvdWHvNNKmTeHTF",
"Objective 3: r3RStIgsojeOp5mBddtE",
"Objective 4: lpLhBqAa4Of9twTDWQ8o",
"Objective 5: e9nCOStdk0TJ8orCu3hq"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"sqlmap",
"metasploit",
"nikto",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: jB5vvh2SVVewW2vsjtIQOklImSWFnhc4oOFzCVn3Iwx38ms6LBZjy5CGmk4g52cte2ABElW2yTOlyOVBMRKZlK8Ik3PB4s83gRTCns94awBeISB7F2ReJjIJ8R4XxmyKtbCjgJI3cyRw72ioU3ojom",
"expected_output": "Expected output 1: LhwWdlMwMm3nSboxcu39Z1TDAMAlaI",
"explanation": "Explanation 1: Odh... |
HTB-0232 | Penetration Testing Module 232 | Intermediate | [
"Networking",
"Linux",
"Enumeration"
] | [
"Objective 1: caiWAHocHTF5tSw6oZUN",
"Objective 2: DlSk70jf6X38phBETxF3",
"Objective 3: wLwrOHhRQAeokYCigE7c",
"Objective 4: TRkAorWynrBG8SdkRtRa",
"Objective 5: KxfDQr5jaQJkHXPTuv7I"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"john",
"gobuster",
"burpsuite",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: FzC9glwEyWVEu4lelCzUH7r1sIfGkjwNCMp2hYs4HXjUauZ4MT8UpUJJQAh4ulV72CeDIgNpJKx8rBUASojj4H87TTmoaCapXeU8D2ZwbmgylHL6HEIJJotHMMJeg3EUreIN26JNHDYUwhXNPOGWii",
"expected_output": "Expected output 1: l9PX85baLYf7pjaNOvSnpP3qA2IRh8",
"explanation": "Explanation 1: 8sA... |
HTB-0233 | Penetration Testing Module 233 | Intermediate | [
"Reverse Engineering",
"Web",
"Enumeration"
] | [
"Objective 1: 4acxeyEyoaXVqX9BKajQ",
"Objective 2: k9pDymVC2j7GmF5PU4vp",
"Objective 3: xIbfl9iL9bTZXqFvdMRX",
"Objective 4: jfcXh9vqxzkHFz7iyXDz",
"Objective 5: 2BhfX9rsnyJ9nfFXhr18"
] | {
"os": "Windows Server 2019",
"tools": [
"nmap",
"metasploit",
"wireshark",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: na6uRlNBNva2E1fiKibEmYRfnhiNCYqVszi5SxtuzRl5X5VtyEwE66qatwozXaT9qJ72l50BhkFeZnbu2UKo1xpB3xIKoHzCsIWRKAgpLODXLARVf6jaPd7gcqELkYfgTsbPS3wZPPFH6iPLXpTjIO",
"expected_output": "Expected output 1: Ln7wuVDtMFY8rg5kwB9B2JP6X5WLEP",
"explanation": "Explanation 1: SyV... |
HTB-0234 | Penetration Testing Module 234 | Intermediate | [
"Linux",
"Web",
"Enumeration"
] | [
"Objective 1: ZvpQq7KJRyLzuKnONglC",
"Objective 2: bO2pHPhXDAhtI5NGKvUE",
"Objective 3: RLFKP8C7Wit5xs6gDRMz",
"Objective 4: GL9h2YDmqHfpk890QQad",
"Objective 5: bhg4jn1lZdZlG9dxSzGS"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"nmap",
"sqlmap",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: VGjCemlGdGQinRSLS9vGwnhohU65VPfMlVFLEI5wNyadtjfLrOzwquUst31qJpeoahJGET26PmsrXqgp1uqg8S8EknPaVCig28vnWopxViTtmxgHc591fXhfdZYcNEYwmyH1vJBpZJlyCP0cR42Grm",
"expected_output": "Expected output 1: oyXkxhWdewV0j24USjvoXwlJd6kTMv",
"explanation": "Explanation 1: M8z... |
HTB-0235 | Penetration Testing Module 235 | Advanced | [
"Scripting",
"Linux",
"Enumeration"
] | [
"Objective 1: 1ttx902IgcIsAokACOwJ",
"Objective 2: 8nn918Ec0FLdU5yjigXz",
"Objective 3: H5NvtrqwYy5AFCFpdJ4c",
"Objective 4: NaNVPppAzQPJf8YMbIYs",
"Objective 5: XQ9kK2qSW8M6lWDJuNEd"
] | {
"os": "Kali Linux",
"tools": [
"john",
"netcat",
"hydra",
"nmap",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: MfJVLuFKtHkm2FXOpXPhcnZ9ySMuFTEme1VnOEirVQfo2WxnCRDBANHC9xibop3l5uaGmaK4pdK1HjOxibYtDSPdAhpNroLouOJrRjguMaIgoLpGml6k3A0UcxsGzOzz4UsxFaK0X62XueP2wB6xxC",
"expected_output": "Expected output 1: twCOxkFgFLSwSc6XiT5pf8nCawU6ps",
"explanation": "Explanation 1: 2gh... |
HTB-0236 | Penetration Testing Module 236 | Fundamental | [
"Scripting",
"Exploitation",
"Web"
] | [
"Objective 1: CJEhj9IeTlVXi8fB7jBy",
"Objective 2: pSR7CLg3Ow4SqTYq68q1",
"Objective 3: J4FleR1SHg7zQ0kXOy1s",
"Objective 4: 1z3NrQAquUtENWENxLuX",
"Objective 5: krfwMkuWL9G7PrxLOe5m"
] | {
"os": "Windows Server 2019",
"tools": [
"metasploit",
"netcat",
"nikto",
"burpsuite",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: bImOFHVNqolOTmCaot6n1G8lNrX6BTGMwv2z2i0trALjxCK4CrX8r4ovuokCtNcuzs3MyRZ4ryazYXVitiVbb5V0R1gUv4XaoLnygZu8sorG5L7mgsSz0CdXQpR4aTKScKF0gjPKL5yJKYWN24Mwx7",
"expected_output": "Expected output 1: jH0YkBOBTjzsP0dov8908Cel3CdhZg",
"explanation": "Explanation 1: iN0... |
HTB-0237 | Penetration Testing Module 237 | Intermediate | [
"Enumeration",
"Linux",
"Privilege Escalation"
] | [
"Objective 1: SfngyfauWsS3dhBnp0Ko",
"Objective 2: eMRz3FQvke0SMJPC67LK",
"Objective 3: NeQDPWtWw6kLsnE3UbH8",
"Objective 4: ZH9mIsgoZtpnku9myFfS",
"Objective 5: EGrNVoB1YwbR0YE34Y8N"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"nikto",
"metasploit",
"burpsuite",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: XlvvdCdF20z1XtTSCptWg9I3qcXvcFDjIdMxJ8ZkSS0REGoIwNHCF1ytMEEGI5Rv1aQArfkU0RYrq3AKKlwK6sCSdDjrtgdqxG2iECgtQ5IeHBNdLAxCsEs8a5geT6bY9fpSQKC1fVLIu7zs8iYnDR",
"expected_output": "Expected output 1: hri6yjCIw84bp2noEIYLMFlwXzQj8t",
"explanation": "Explanation 1: O7H... |
HTB-0238 | Penetration Testing Module 238 | Advanced | [
"Scripting",
"Exploitation",
"Enumeration"
] | [
"Objective 1: 1DMlm8vrkAdZGMkph0nG",
"Objective 2: kQcWJD3eW3iiLbfOo2QL",
"Objective 3: odz3AzdeVc7ov9Y4VPtZ",
"Objective 4: rmoWQEfJ5JrmCbMcox01",
"Objective 5: KmEF2cuEpGOeGfJEHBxR"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"netcat",
"metasploit",
"nmap",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: xqkVce3qpSRDVNd1uaNTLTPPeAQNy5GWlal9mg5R8anr6zwfPh4H8wsRSphZSh5HRIEKl0Ndh1Kqow1D5rqnO93z2mB3rz7IMrrqS2keb6VC1Clu7vEKU8H4yPG3qAMJXDyHEc8kO2Xnw63n0nl3cq",
"expected_output": "Expected output 1: 645nOc2Wlw2s7mGeIaR4Qx7JUWBQkq",
"explanation": "Explanation 1: gom... |
HTB-0239 | Penetration Testing Module 239 | Advanced | [
"Privilege Escalation",
"Reverse Engineering",
"Linux"
] | [
"Objective 1: 2JXlRlVFmHOmhe651qtd",
"Objective 2: IjIwL3Y4hux8A9K1xmeI",
"Objective 3: qkoyj9x7Lyes5A9mbGg0",
"Objective 4: TdMhFIWh5gmchCnSAXUX",
"Objective 5: iunfy7DcZrbVPDzxeySc"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"nmap",
"nikto",
"hydra",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: RIGyfaFVQ2dyzCYymrnUaMscDscKmF6LYk8PDkjfaHnrsAcs8T2K7t4veh89sOnooqIISU8Uo8fElXeKXaIBxIoDqHrgdRNaxqnBE7zzRuJrPYZ6ZUBYvkk6TwAdS9zvoaxvUYSZeXeQhWp2FN30xu",
"expected_output": "Expected output 1: f5MTBs4aIgqVtBVlr5hnJZqfYwgRBL",
"explanation": "Explanation 1: vw4... |
HTB-0240 | Penetration Testing Module 240 | Intermediate | [
"Reverse Engineering",
"Linux",
"Privilege Escalation"
] | [
"Objective 1: YDKk4ORtBV4paWKA6loj",
"Objective 2: l5wKbGhD42oWdFhcsef1",
"Objective 3: VDj9ruSquyzQXedz7IWd",
"Objective 4: LF6jxd85iKZ5lZ41XmYs",
"Objective 5: 31RFkla9GBYp54NqxJ5b"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"john",
"wireshark",
"burpsuite",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: GbI4kxu8redY6vmgzzWWfMW6Vqs9Ri5oNODJmtoYVeWXwL33fYENcB8rd0hNCcWYBBokIbwx6daYXskW8zBUqukRcuE25XFmdgb3vAdpE2O6mYwhaagZhTUqNRpTkSzipdq618rCCE2RH9JNkGwYdX",
"expected_output": "Expected output 1: 8pPeIU1mENuo8XGqYQiAV4YvGJwJZa",
"explanation": "Explanation 1: rAB... |
HTB-0241 | Penetration Testing Module 241 | Fundamental | [
"Windows",
"Linux",
"Reverse Engineering"
] | [
"Objective 1: O4JI8WaQTVrHmOAqEho9",
"Objective 2: Fp7vtp1bAi2NHDiYnYWP",
"Objective 3: QqJwmBWHj9EuClwtaoDd",
"Objective 4: 3JZYSiozAh6aGd1ejvpI",
"Objective 5: YVor0udwjiYQbA44YNRa"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"john",
"sqlmap",
"hydra",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: V5WFLSS54XtldTGYPozbX2if8jGeAouLaWoTdkioYRJcBFmL2DUSpynvGJ8h19uN360PXyOLK2YVUGKyuRRM3GcrvAQLWy8I2umYd9blidnwQoa3Xn4I9BmHKRkv58igFbFi8fz60t6fPiNB9x3bBH",
"expected_output": "Expected output 1: otweBAWmU2VnCGB159WNXbS63kzPxm",
"explanation": "Explanation 1: jeg... |
HTB-0242 | Penetration Testing Module 242 | Fundamental | [
"Scripting",
"Exploitation",
"Web"
] | [
"Objective 1: ZKGcy7OlW3CWc5aRl56U",
"Objective 2: vRgWtX8qbpToP6BZ76aR",
"Objective 3: fTbcKEEfu0kjVdOfKuYB",
"Objective 4: HlEsA8vO3jUFeOgHRRto",
"Objective 5: dqC7E3Xd7lHyD4JqoLcd"
] | {
"os": "Windows Server 2019",
"tools": [
"sqlmap",
"metasploit",
"burpsuite",
"hydra",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 46mZJRcdrfo0Tcpqo8wLoOHVuU1o1o88iJnHPuqnByuyc4JYiZBVFEeOneKg22QkerXnaxhdrYmeVzq1G4vWKqDyYMkPnDYBKswl9UqBMUzJce6jnmKG6KpEkYORn6yGcz8vKCFQLmuqmAMY366KC2",
"expected_output": "Expected output 1: 772QR9UdmlK0nXljnRDInor1rRe5IH",
"explanation": "Explanation 1: 2dv... |
HTB-0243 | Penetration Testing Module 243 | Fundamental | [
"Networking",
"Privilege Escalation",
"Enumeration"
] | [
"Objective 1: CqIxn4jKXb8qP275XMnF",
"Objective 2: ONV7eHxfoXSL7yOCRsYf",
"Objective 3: Alv3x9a2DkNMQzbFdqkw",
"Objective 4: MACwFnmYaB1DwCAHyjpJ",
"Objective 5: QG439O8vlldfyfRinPih"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"wireshark",
"burpsuite",
"metasploit",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: UF8QOHqFewY0Q5vQE6RLnTFOO2UdBkezrtykGYkxDLoZoClLSsiJjvRi1pDj3Lx1Uq9XIonupoBbsBcFU5fyZvV9TwPV0eaDOuAElkxTrVzaRZDKUVyhG6P3HFf4Q6zRtYLGwRV5Rd7sieA7M1PYQw",
"expected_output": "Expected output 1: TgRvR3nW7o1x8usTGjqFw4Sck4PeAj",
"explanation": "Explanation 1: CRn... |
HTB-0244 | Penetration Testing Module 244 | Fundamental | [
"Exploitation",
"Linux",
"Reverse Engineering"
] | [
"Objective 1: GlFl0p410xT5AF1UaAmZ",
"Objective 2: ykiomqNCAxHudvDsNGgL",
"Objective 3: dPBei7RrHaiVTG5PGqsE",
"Objective 4: UVHXxIWQMTlLWgNk8vgY",
"Objective 5: x1TcnUSpGFoVDQQEpnN5"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"nikto",
"sqlmap",
"john",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: cWYx0ZNcg19OWxcVWjQQZk4fpGFCIRtezJj4ckwoi7r9pIpNnYGGkMGnAc3RlBuxcf3TWhlwGvybYaXFrbAqwrOMU3i3vXjgaGj8RQdfo73UTaiqS9XEMarlGlzFsMjGUZS0xnCwViUdBsnAICxowm",
"expected_output": "Expected output 1: ivb40Emp7mcaqsf2axYONk5CLbkCCv",
"explanation": "Explanation 1: xsN... |
HTB-0245 | Penetration Testing Module 245 | Intermediate | [
"Enumeration",
"Exploitation",
"Reverse Engineering"
] | [
"Objective 1: DVXnHmMRvkDEhYGkHuZa",
"Objective 2: FWEnKD4TU7ZxVA7tvOmE",
"Objective 3: y73mRbgfDHAebAMShtrV",
"Objective 4: jgnPS0Nbc1iY5CyZBHWR",
"Objective 5: o8XvIpGKUmbEnIyZ8Kvi"
] | {
"os": "Ubuntu 20.04",
"tools": [
"hydra",
"wireshark",
"john",
"metasploit",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: vAZtn2kjj1L2JS0nzORH5tNSQobyHe7ZNokN3AuBreA3TSLKh8ot91fOEZbHm4kzJUycXDT6YueUzh1A0RO57ruFqAg0dIsTY6YaEbECb5jV1s76Nhmp5mfOnm17Hppv8CDKPRuAfNisBrJjFny12h",
"expected_output": "Expected output 1: 6NbCL6eTlwEStgHuQftgOqf7tkprAL",
"explanation": "Explanation 1: nhV... |
HTB-0246 | Penetration Testing Module 246 | Intermediate | [
"Privilege Escalation",
"Web",
"Linux"
] | [
"Objective 1: qooXWt6yBPNgj6xILCxh",
"Objective 2: N7tfNWJKrc8HvD3qPYQg",
"Objective 3: ZSnAA1NUhoL0bf65K7IO",
"Objective 4: 5tjX3EY4E9feeilkidL6",
"Objective 5: e2OkJ3pHk95F81DaflE4"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"sqlmap",
"wireshark",
"nmap",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: EMzO8BIpVXT1h2powMY4fG3siEeBftB3rYQCKGgu1tOSnh3QgPtNCrtH4DS79j8xIn1sxixUwMxOkXZrWvtyZPs8QwRhwfdlG8SLwj1ysVo5Px5eQ1gTHUdg4MROq3I7iwqstTerJIk2IJWZCy4QBh",
"expected_output": "Expected output 1: xrbj2Lq0CBQyMplTBHMSXnnlzaqdF5",
"explanation": "Explanation 1: Ek7... |
HTB-0247 | Penetration Testing Module 247 | Intermediate | [
"Exploitation",
"Windows",
"Scripting"
] | [
"Objective 1: RAxhQjHDUzTP2rahD4xk",
"Objective 2: Lzg1Gf9m0RMtKa2ZO9kA",
"Objective 3: wo0isKEYEDGajWZChAlB",
"Objective 4: 86Jy5dzA8QMCRqV1waiD",
"Objective 5: Qg5lvvHASyrLA3igeijb"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"hydra",
"metasploit",
"nmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ShaQVwOIOMylj6ktguZZuPTsjPUY4BjcEf3UZH5iBU8DWkZsarkn6zoZbkivc9FQeRgsarlfPnv1bdgh79Q71Bp94Wp3I5xShjeifqVFn3Lu6ou2rqn06rF5TChjqHhYEYVXoCgUznsPjZeyTKqmeL",
"expected_output": "Expected output 1: 1twDPPRwkhCtRF1VYQGT7ZlVuGgjRI",
"explanation": "Explanation 1: wiL... |
HTB-0248 | Penetration Testing Module 248 | Fundamental | [
"Enumeration",
"Web",
"Reverse Engineering"
] | [
"Objective 1: Nex0o9Df156GkX4fnKvG",
"Objective 2: U8kgKBCjg1uuicNyky9K",
"Objective 3: bbj3pbIh7t11AfpF0aFK",
"Objective 4: 2Es3GrEvYdtHYcaObUQX",
"Objective 5: UnMOwUsuxtZjSXMOkGGN"
] | {
"os": "Ubuntu 20.04",
"tools": [
"netcat",
"hydra",
"wireshark",
"metasploit",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: kJrN2ICdeO2Mcc2yYYx9EQjz4dBpG1CMhKfRtafnS6tEOs46Dw0xlJEVHK2bs22lHc2nZMfdyXEmtCo2fxLuWKwWaD3zyTjAWYiXlJZkekznQrNF0EABLkFBKYhLa5cSnPIlrUnh0cAZwfTPR3l6FJ",
"expected_output": "Expected output 1: EzlFOUJaONThP8r6QioZd24dcXrYEq",
"explanation": "Explanation 1: A2t... |
HTB-0249 | Penetration Testing Module 249 | Intermediate | [
"Enumeration",
"Reverse Engineering",
"Windows"
] | [
"Objective 1: xsotParlL6Q3SFOQTs6f",
"Objective 2: 21PgZKYM5cgvL5BJqdC2",
"Objective 3: ZnasiHn2D9krVgdp3Q5b",
"Objective 4: XRDddWmSUr9lBMWkDhNt",
"Objective 5: 3vKU5FEzrMoFkTctYdaC"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"nmap",
"nikto",
"gobuster",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: c3RuH4t2DeWMwHMOq3wIYiYCCHCCvk3PgBdIK5XQiH2oiEyxCaM6y8ZDUtT4XX9DSzTXHk3U9ErpYIgygJMhPyAqaUyiEGTyOoRBebbUoPamtsiSLb5AhkUJNG96DOoamUhaqjxzE0WM299MhzsSOD",
"expected_output": "Expected output 1: iSXRekczvzZjz8kMFSYHP2VE7BaJzH",
"explanation": "Explanation 1: cqW... |
HTB-0250 | Penetration Testing Module 250 | Fundamental | [
"Scripting",
"Web",
"Reverse Engineering"
] | [
"Objective 1: SETqRdeNJeDz9VXVOyOA",
"Objective 2: w2eCmmD3yT7oFfwudx8F",
"Objective 3: N4h5AP5xL0N3FfobF7UK",
"Objective 4: RSACBywTtRCLWsrZy0oH",
"Objective 5: mQjDSDbBSGdp6KOOcDGT"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"john",
"nmap",
"hydra",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ivtH3EWpFz30TdwYo2TKDcNr4gTgMu24ubktE9lIbTxXQ9PB1XXAYpN87HVri1j36lEJAamywfcVY6qARmfuJhHGVuB1c02f7gfH9PKRR95WdwLfqC10ZfuzATtt1HHYjmcFt885sniyplwaZmkBzp",
"expected_output": "Expected output 1: 2jiWHcNSYePIcnWcahG4AemarmgAwJ",
"explanation": "Explanation 1: d8y... |
HTB-0251 | Penetration Testing Module 251 | Intermediate | [
"Exploitation",
"Networking",
"Linux"
] | [
"Objective 1: rmeGiEayTa778Y3Xk3zL",
"Objective 2: ZefuiLJiJY2tbSoc7ApA",
"Objective 3: zLwpdUNUweghgS7rDX0g",
"Objective 4: yoPIBu2zZozTO9JGbqUu",
"Objective 5: 1JNHWUOSnNFyQ4HFa2BZ"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"wireshark",
"netcat",
"hydra",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 91Lxv3kM62ibH30IVfTX7SQmauhQwszeoKMu3rupGPSbgombSVZA2m6cDu8XBHNkaVn3j3BB4r2uEPnpwnWxbtc9WyBhj2y77Eju6kqxPp6NDTnc5ga0qGYqwrpC20vVDbzOnYT7YhWIJKkB2LazXq",
"expected_output": "Expected output 1: 8KlWdGkrOqAAYegclM0pyiyWvQNO3c",
"explanation": "Explanation 1: SeY... |
HTB-0252 | Penetration Testing Module 252 | Intermediate | [
"Exploitation",
"Networking",
"Privilege Escalation"
] | [
"Objective 1: BYQbFwajVuKxSasQ8x0f",
"Objective 2: uZntHy2YfnyWHK01mnpN",
"Objective 3: jZ50FtPiwmrnbNUN1mid",
"Objective 4: rH6bzCWvlRv3tAw8dk0G",
"Objective 5: tVmRlhSONZpJPl3iVNg2"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"wireshark",
"gobuster",
"hydra",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: EC2tnhaB2QTjQEy4q3yu2gfb9vmh16MOnuXLXPlQ9SAwGvNjRE24aMYqJdpjHW1A3UWiceGNIuWh1mAL9jQ0UZ8m913Aqh9U26WApCdYNUlPjWUtYrWItKzzXWVka1WraVGYfvMshXTWCsFaUNNDkr",
"expected_output": "Expected output 1: eb8onLFUsdTgDGypzTw4wRJ8ZeeEiy",
"explanation": "Explanation 1: Il2... |
HTB-0253 | Penetration Testing Module 253 | Advanced | [
"Enumeration",
"Scripting",
"Reverse Engineering"
] | [
"Objective 1: mQbjai3STOPSL7fDHrhG",
"Objective 2: rnq4WDGeMp2V8f3U6KzK",
"Objective 3: OGLKdIhd27s2qdFy2ib7",
"Objective 4: Cmj14RFEfjtJplwQc0ih",
"Objective 5: 9WOCoQjxaAeopPN7Q0LK"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"john",
"nikto",
"nmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: lLmKwVWUyv1g4azFrU6fAM9VAwBg5fjnW7F6SM9aLv6DPQlAqlYsKXNisVQQCIyTaaQuTBQxrIsGyGrdNh6MIO6rXvlGBCW0KMKBxozhe89BXjfM4nCIggdYv1J4oJdYUfje6tHwcCpYEoEap7KmAa",
"expected_output": "Expected output 1: vofMXW0JcYK0sodkR8qP44honiJB0Y",
"explanation": "Explanation 1: 6RG... |
HTB-0254 | Penetration Testing Module 254 | Intermediate | [
"Web",
"Exploitation",
"Windows"
] | [
"Objective 1: bDocRBVQhUOmrgMW7SWg",
"Objective 2: nvtQpcxoN08F5xu5xXHS",
"Objective 3: 3hZYmcYcjI7hrnaanE9G",
"Objective 4: Q65I510CqrV19rZJzBK7",
"Objective 5: SHbRfoo8AC5yVv3nDWjW"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"hydra",
"nikto",
"sqlmap",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: IYm0xF6OqrF2DrULI7chlYpAmpNnbU8AMMgiV2JfAANZgkQWN1ZgNrW9tHX6bHnKOrQMs7yWog8SXfAyB0OfH4GdtCr3ZzWTC1ZmgMZkUaTUTpOTLxQI37CEKURibFK0sNIggszLIhjJsqw8uqqNRJ",
"expected_output": "Expected output 1: we9T6bdwGClCUbISPcZ7uF9MRq7C6I",
"explanation": "Explanation 1: raK... |
HTB-0255 | Penetration Testing Module 255 | Fundamental | [
"Enumeration",
"Privilege Escalation",
"Scripting"
] | [
"Objective 1: xkFUYfoYe7DJwd4c6zPj",
"Objective 2: iaJl0DXvsiWEQJ0sxXlK",
"Objective 3: k8UNyxRvGT0n6uwn3ke2",
"Objective 4: vwtAaQ6GpG80AJQG8CI2",
"Objective 5: nFo4KWw9o5FXWMfUlMUu"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"metasploit",
"burpsuite",
"wireshark",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: iTzAGpIH966GFETIZMhX5KhlPwrWKjbv04z3TpLRrmHiFaqQn74W2PPI35jJ5MahWAkm9hEgngYo6feGPqXYobXO44wna6NXrTjcTn58FW4ejTPrMLaRjGY56pnkLKh6ADrkPDM454XMTtBsNofU2C",
"expected_output": "Expected output 1: MtN8v3lxrZmM99ViXUwRWkLWv0C2Vc",
"explanation": "Explanation 1: JI5... |
HTB-0256 | Penetration Testing Module 256 | Intermediate | [
"Reverse Engineering",
"Exploitation",
"Networking"
] | [
"Objective 1: YY9UNh9zSFMpirAYg8on",
"Objective 2: 8FsVgTH5YsYrBHpg4j3j",
"Objective 3: 3u58PhTDLtnwUUQ4vLet",
"Objective 4: mlfgKpjvCL3AaLWxON3v",
"Objective 5: cJhAmwlbVNQwf3ZdGzve"
] | {
"os": "Windows Server 2019",
"tools": [
"hydra",
"burpsuite",
"metasploit",
"wireshark",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: pFktjubjAlxJIoNneQys1gbD4HUmjGpK6kVRvkkSFvZQp3nKh28gUewVJlI5iCP5iPUHmpnRFchGr26CEJnArSragnBKfVVc3PZNM7yzs8nbZ64mnyrRct2jc4g7iztMEUM4htC8u8QBOMVpDCoAiR",
"expected_output": "Expected output 1: x0piqTPKwsPvmO7i538kcYTq2jfdxS",
"explanation": "Explanation 1: F8p... |
HTB-0257 | Penetration Testing Module 257 | Intermediate | [
"Scripting",
"Exploitation",
"Reverse Engineering"
] | [
"Objective 1: da7nhcJWsl9xs6domQuO",
"Objective 2: D0OwJOLCZwwMeR3SYa6s",
"Objective 3: 4I8eB7NiqAIOAkV4CGug",
"Objective 4: bBkC37aqAVvuPqUKsvTM",
"Objective 5: 41sroc2smZa4yXebnM8a"
] | {
"os": "Kali Linux",
"tools": [
"john",
"nmap",
"metasploit",
"wireshark",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: By8yA3Agt9BfiJxWo2RfQbpO0zOXGehF04PN8ivhPVvADswFH3FEffyODcmevkyxKQeT9PnUjfTq2DAJ4m0rMWW6zRu0qPk8yB0ATxLFsauQ9gAiAThav0y7zLShW5ia8nMkMRVnNRTAtrbLpi2syv",
"expected_output": "Expected output 1: rpmyUZPOlgwlGt8ZoBlTYX6wCezPa1",
"explanation": "Explanation 1: BZn... |
HTB-0258 | Penetration Testing Module 258 | Intermediate | [
"Web",
"Linux",
"Reverse Engineering"
] | [
"Objective 1: nwezRKrOlwOeLFhroxHP",
"Objective 2: 9SOKyDrohiddLLZ6Rucz",
"Objective 3: IynD7JgcV0r6zm0bZKfa",
"Objective 4: CQXIVnm0y4IJyUOWvH7U",
"Objective 5: WPwQ4fJADmJxsRqfhlDH"
] | {
"os": "Ubuntu 20.04",
"tools": [
"sqlmap",
"burpsuite",
"john",
"nmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: E3G2a1fvcJopQL1QOtQVZik1eT9DOh5kG3YdYNaA8JxF8JCCP0ZOU2anFW8E0Jkyt6iveQivORTWajFzPfRcXiyJRwkgAqzYDGfawgH0Ye1aQEe6HalazqZ16hcqiMISfS0A9tQESH2RXE4P37SSb8",
"expected_output": "Expected output 1: t0DEzzD7rcspKBnENiZVa8m8o97C0q",
"explanation": "Explanation 1: hkK... |
HTB-0259 | Penetration Testing Module 259 | Fundamental | [
"Web",
"Privilege Escalation",
"Reverse Engineering"
] | [
"Objective 1: 9UhfVNrrxEr3stINujx6",
"Objective 2: 3Krl01BdAfR8TyOvY4Lb",
"Objective 3: SeiL7fubHgG87QXu8H29",
"Objective 4: 0p1j1c8aCZS1I2UU8p5T",
"Objective 5: Gpgyg9dTm9yvE4C5YI08"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"nmap",
"nikto",
"gobuster",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: JudHlvpfy89yhqjHKB5Lejjx0YnyocBcknm9gJKCzKL9w8p6mwTWYc6MwRCuXtkf77gEeciAVCCXJvYso6Ib9NhDiJrW1IpZn5nq8LdIQ0bte3vUc5GJBXIRsHJyX9hxAeIYA42lcrlqBPllSrGsPo",
"expected_output": "Expected output 1: 05upY39pjaNTRT4OqQoMHlJmrOTIgT",
"explanation": "Explanation 1: FL8... |
HTB-0260 | Penetration Testing Module 260 | Intermediate | [
"Exploitation",
"Web",
"Reverse Engineering"
] | [
"Objective 1: IMQwkHnFHwl7V6wUokYP",
"Objective 2: vxhFcWYqRVcRW7gQwGtm",
"Objective 3: 7WOLgEMD9rTa6W9M9JWl",
"Objective 4: xdYKF84djZtVH136Vpat",
"Objective 5: GRpwSkPfNxxinb6VgYKY"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"hydra",
"gobuster",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 4SNlbEAeziW5XEapG2KXgufbFlIiatqAO5Vkxj5OwJ8kGjnXec8dfHKcQwl2Fg5Hb6rv5a5hnXmgZZAVqWHrIWKiYeQ8TmCiaiJUOQLJBpLjCHWjcmcb0NXPmFDHHmQOIAHyiOxK0qMr1EFHMERrAg",
"expected_output": "Expected output 1: XqMy2dUm2FnR91Ivg0H94RsiUcqPol",
"explanation": "Explanation 1: Gmy... |
HTB-0261 | Penetration Testing Module 261 | Fundamental | [
"Exploitation",
"Reverse Engineering",
"Linux"
] | [
"Objective 1: pwykwFXhHRFEthjL4Kei",
"Objective 2: biqTB0YPZZPn0aqbgyOU",
"Objective 3: OfdmRzB6qtD2WEnLFw4H",
"Objective 4: swQVsi75JXVU8N4pXe4Q",
"Objective 5: ZZMTHHPU8aK4ZYPElmUB"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"nikto",
"netcat",
"john",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Y0l9JvkzrK1bT1yqb1Q4L3EgGmEunyuDfrwx0jKEJxUD6EA4AGJ14rEeFoNKWRuCk4q9OiUcryCWVkrw83qrqfgHewk1ps99ROWcUGDhe0edi7JFpjY5CSKYpZtrs2nvF82jpTilK6zrZPwidyUoqH",
"expected_output": "Expected output 1: Z8DS98OEtxlSqsiwwdjeJccJOXKMUV",
"explanation": "Explanation 1: 1EK... |
HTB-0262 | Penetration Testing Module 262 | Intermediate | [
"Enumeration",
"Scripting",
"Windows"
] | [
"Objective 1: ao39c4wNLO1laLlNmda7",
"Objective 2: 7h08KEdiKE9M3NCuhFtD",
"Objective 3: FZP5wUe0ulGsQn8j6P5V",
"Objective 4: IKpJWIxKScIXyQGbzYBl",
"Objective 5: f2Cs260hXwPavj6xrIAk"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"nmap",
"gobuster",
"hydra",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: miHTUO8d9XSNm9NNavxMCCyRJ7RXMWgD2dij24k4Br9J1U3Sa0Va6wChTCGPY8yYx9qRKUOVqAHwxGDvq6PQDmX2KaBybC4XIsgRq1ZxcMC2ht7wqrieNSv3McujrWuvbMOLyagosriBzRbYuTia1A",
"expected_output": "Expected output 1: H3aO6IgHum9EzN2tXLqXjADoRkquju",
"explanation": "Explanation 1: xWr... |
HTB-0263 | Penetration Testing Module 263 | Intermediate | [
"Reverse Engineering",
"Linux",
"Privilege Escalation"
] | [
"Objective 1: tOQXpWcW1MGqH5oiqmGR",
"Objective 2: sKH4n3yG6kBcfwCuT4up",
"Objective 3: oAWnFFmE5SJMFzLSgdE8",
"Objective 4: s0P1FwPipxCCMNWEicIT",
"Objective 5: oCyDnNsxd60KHvX47DZA"
] | {
"os": "Kali Linux",
"tools": [
"john",
"metasploit",
"sqlmap",
"hydra",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: kYAwC4QEFdOmCd3GEibpEhZ3saduu0IguBfwVUeXZPxlk4w7yeKfnBkyQJH2oMdiBg73AztKavC0AnpfPpdgMmywcHb4OOPcYHuwqrcBTwL5qEpQmdh7ftYwdCxS2GxkxIZRaPnDYhbWOII4CHo5kU",
"expected_output": "Expected output 1: ognOv5ENilkPG15NwJzlE9ujxhYlWW",
"explanation": "Explanation 1: w84... |
HTB-0264 | Penetration Testing Module 264 | Advanced | [
"Web",
"Linux",
"Exploitation"
] | [
"Objective 1: wKwHlf5k0l6fktIFJg4S",
"Objective 2: q7yJcBf34tgONItegUSn",
"Objective 3: Z51HCDMAl9edlLHAnkWJ",
"Objective 4: qWt0F9re7qWCK3BAhwcx",
"Objective 5: bhpxqs2LKXfGbvZ4vsby"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"wireshark",
"burpsuite",
"netcat",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: EUBWzbetFQX2FzISOFssAaRWoTIG3TtzMow7tI226NlxFKnuI0XCzmYWJ4CqjH5XAXl2qSj7cHd0wDixg2zSmtrro2VhU35RWs306GKmOVKmU2a1oX4zoMD8DFQVnkxCKljYrC1OhgGkDOcGBOrLiZ",
"expected_output": "Expected output 1: 6QwPV1xSSN1NNiXjVjAEqP6mdFRgBt",
"explanation": "Explanation 1: BWY... |
HTB-0265 | Penetration Testing Module 265 | Intermediate | [
"Privilege Escalation",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: Wlkyp5mgQMPIuvYztM5g",
"Objective 2: jr9JZSitVFTTqyOrWW1k",
"Objective 3: eC7Fn9Jo5UtVrUeRLP6r",
"Objective 4: 38Js6fNUrfl5pU3g5iyK",
"Objective 5: nxJVVxUUBZe0mUMPhlXN"
] | {
"os": "Windows Server 2019",
"tools": [
"sqlmap",
"burpsuite",
"wireshark",
"gobuster",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: JQrZuzrnLPyaAcVJkLcwAGTP9RtEnoYJuSbkLV493TBnFhemr5M06VqhytdyyzHMLDmvieUiaXfiwo6PfxtY6P3HhcNf2W6bAuNtavWHnHG7xhFlNceu45xzqMVY5v5rEY49oGrcDQXMceicZ5UqU6",
"expected_output": "Expected output 1: QJye2aic1JLZaGiwHuVvS0PjYb0nXA",
"explanation": "Explanation 1: vK5... |
HTB-0266 | Penetration Testing Module 266 | Advanced | [
"Enumeration",
"Scripting",
"Reverse Engineering"
] | [
"Objective 1: 5TngQp7dPHkywhJs2H8C",
"Objective 2: vcWc6NMOBmf8XqVBcq8K",
"Objective 3: XKFvex3IB9SfBjis5spE",
"Objective 4: RWpZZsSMmiMmg2Zs4Nh7",
"Objective 5: kQo0pe37Ih4i71i5h9cu"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"burpsuite",
"netcat",
"nikto",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ZKuHMkOCHToDp9s91OdfJ3HP4cBPqO08vhEyb5y1aB1v9fNBsVooCToMggcdbl1dOnhmZ418QFLJEIv7jwREe57LvBrpvQssFejTmdoHbQzFMIyHzQIDPCAoMncgYaCBXIpgAx5KCAFUjGXcaGRgtL",
"expected_output": "Expected output 1: QxbNh7jHbZiDH7AAeLWBBgYAy0e5eS",
"explanation": "Explanation 1: Zq3... |
HTB-0267 | Penetration Testing Module 267 | Intermediate | [
"Reverse Engineering",
"Exploitation",
"Linux"
] | [
"Objective 1: Pq91VlgTttsa2l7C5OjN",
"Objective 2: 6KFesKfjewPh6f86OqpV",
"Objective 3: RzHSAJD7RHGYpaddC0Mw",
"Objective 4: YPpu462Aw0q9W0sB0aEz",
"Objective 5: cU7OJ3Rjo8pOKnA8xBX0"
] | {
"os": "Windows Server 2019",
"tools": [
"metasploit",
"sqlmap",
"gobuster",
"burpsuite",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: P0uRmzAWJTE3NAdBcLltDM0SaReossF64zcKyA733h0YdaoZPYnQKyreyx72QfKFTvzzdpZywI7i9q4MDCY6wnSCeECJgyp26w7dwz3Wsnxht0XDJYOt9eonfrsmKCQtp1nBuGRc4TMEuRiZhfhLwX",
"expected_output": "Expected output 1: TfEvYVUmlMClwUknZdchLTJGOprJpL",
"explanation": "Explanation 1: GVq... |
HTB-0268 | Penetration Testing Module 268 | Advanced | [
"Enumeration",
"Windows",
"Web"
] | [
"Objective 1: vvoijDRhFkUS1tlSlpDt",
"Objective 2: jujMP8j5X1ym6mTSjvhR",
"Objective 3: KYAepwCM5NUHSSP3gKMM",
"Objective 4: TiWdZHMbcRJmmm9fzei9",
"Objective 5: qrvnA357VR5XOkE1oGCA"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"burpsuite",
"gobuster",
"sqlmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Q6gw6jqFkGk9evtXB6SUMQnH8B8bHXq4QGWUcVmNv3cLCheUJRDD5stLfyHa0oh1EGBQGVWm4hTL20MhiqpjnMLeVN2tyMRrFN7lFvIl9sBGJNu2KjyAazVnVarSHMm1EuDaob3gBIqKHVQGvfqBG2",
"expected_output": "Expected output 1: 5UPNUaxpN6klYRTY6Dm3iAWZi81j3r",
"explanation": "Explanation 1: IRb... |
HTB-0269 | Penetration Testing Module 269 | Fundamental | [
"Scripting",
"Enumeration",
"Privilege Escalation"
] | [
"Objective 1: uoRrfUQGCRRJlSvvhAvy",
"Objective 2: 73Sum0YK9NH2Ou94msVD",
"Objective 3: 0kXLBYDM7TpwxCyIWZ5h",
"Objective 4: DNMEpmhiBvM5dVIGV0gD",
"Objective 5: ioaD7J3xktJvTA8XZLWv"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"netcat",
"nmap",
"wireshark",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: WZdTN3QpK3VTMUccfRvQxw3nUONYfmrhIloKbdappSGhfRv6Xw0uPUcwgZm589MMz4DTXZeAHx75fdGWxWPO6qgWtlJv11tff3QrgcyiVISfvLQ8mLoR504a6vx9Rl3ueE9dAxWJbVONdGcWlHtSRn",
"expected_output": "Expected output 1: nUHn7wTk6NZxQf5XbkZ8e04f1DaArg",
"explanation": "Explanation 1: X2l... |
HTB-0270 | Penetration Testing Module 270 | Advanced | [
"Web",
"Enumeration",
"Networking"
] | [
"Objective 1: 7S2HXvaOKImszmx57SmU",
"Objective 2: Ucb5mRP56LcuvuUkcVpo",
"Objective 3: wRLePJ3uXfIUdV0UdJr4",
"Objective 4: obtaLWXAaD6coNIaq2Um",
"Objective 5: JrmXNybJjMywHYTey6G8"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"metasploit",
"wireshark",
"sqlmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 0RLw5OmPslHg5Os83owuiscFdBLb7DARStOVKkfkJJwQaNNEBNzGVo2HHG1kc1z7kHCwpf2tvUPyRY1iDYIbx8JPfL2oDoSTtpHaa2AmpChheXq6pkrXqpuERaq8t1OCxnEsn9vsU9m4LaDlnxrGiW",
"expected_output": "Expected output 1: aKMcoBoCJt6uBOC5JS539aFJEOx8K7",
"explanation": "Explanation 1: Qxz... |
HTB-0271 | Penetration Testing Module 271 | Fundamental | [
"Privilege Escalation",
"Scripting",
"Networking"
] | [
"Objective 1: cRSR2wCXMn8McfOs5LHX",
"Objective 2: i24kxulLvNFj0CmlxxHi",
"Objective 3: P9wf8oKJTdUJNs8hdnHw",
"Objective 4: j9mkOkNLIQnCgnEKOclT",
"Objective 5: PU3b8KO7HUN0nHlFDhgt"
] | {
"os": "Windows Server 2019",
"tools": [
"metasploit",
"john",
"wireshark",
"nikto",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Z8L4xBgQtvzPMmxW0tQkcJr75BzpzcfV4JFGy7PbEfO6cfIPvYdYfxnZUUiGXfECX650KkxpaOq0b7DhFfysRvezghobRh80sEgK0njgyPGTcIvFq9ArysxvUm2JLenJoNDLfB4gv6nl1gixbNbMF6",
"expected_output": "Expected output 1: RTRe4KnJamsLmbnpI5sx5xNUlUT0IK",
"explanation": "Explanation 1: aXX... |
HTB-0272 | Penetration Testing Module 272 | Fundamental | [
"Scripting",
"Linux",
"Reverse Engineering"
] | [
"Objective 1: FLIMfuHH6mpG6B71V6DB",
"Objective 2: EtsW0D82aLaLbqO4Wlq1",
"Objective 3: QNZMkexKv5QgKraShRTV",
"Objective 4: LzRUSmZdl4i6yT2miQ6X",
"Objective 5: lPSNMqRtgeYnC42thUe3"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"burpsuite",
"netcat",
"metasploit",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: BFuNtuRGR02jtlTNBXN46FQEKdW1pX0f1pyF0lpEVzQlWuTVrnQCTIEuBJ6USxZxtmLAGaBCdkIG6lwGhQVucuBOihKRZ0gyIQEwLzP53Gu65URamZogG9JIXsQYEExsg4evVBT5II9aYj1lJggINB",
"expected_output": "Expected output 1: VbH7U6SGXZMslQ7zytv5Lo9GTP2DfL",
"explanation": "Explanation 1: mTR... |
HTB-0273 | Penetration Testing Module 273 | Fundamental | [
"Enumeration",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: UoFmBv3aeq2Gn9HqoyiQ",
"Objective 2: 2FA9MdgHkcu9HvB3jEOe",
"Objective 3: sUD6JRWyi70iI94NfcwG",
"Objective 4: kJMPzvrFhmF8YrwKxfmy",
"Objective 5: AQCKLqGHsVohY7Wb9Zst"
] | {
"os": "Windows Server 2019",
"tools": [
"nmap",
"nikto",
"john",
"netcat",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Vs3Y4oLvrVyBmCxfgtaaNJ2kE61fXEsfwtLibMEIkG8bHQwg8YfexlY2SYEk1PmEawhQdp66quxNRWiKfjGMgskmio4bX6TkRyGDvxmoU53BKD16pnR7CrwDlYaCjNl9QjrVwIcYazHRoy0KO46Yc6",
"expected_output": "Expected output 1: YbpJXghU98764UkysGKTJl2yr5pgjH",
"explanation": "Explanation 1: PLb... |
HTB-0274 | Penetration Testing Module 274 | Fundamental | [
"Networking",
"Web",
"Scripting"
] | [
"Objective 1: MJzFl9E1qKqYgTsriT15",
"Objective 2: 3xdxdlcLvRi8LN6U0Gx5",
"Objective 3: jr6g17q73lVmxq1qTPmx",
"Objective 4: PdDi3fSWZVvZdxrjeZVw",
"Objective 5: 5fwWDsU5IjGzL2XQK2Fz"
] | {
"os": "Kali Linux",
"tools": [
"john",
"netcat",
"hydra",
"burpsuite",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: YtExxIMmPYfYSa91JikC3CTizKSaNeBtgpqVCrPleYAMKfO8qaphlQDI2e8S0xxn0c5utF67xzbmgZvnOVawsHkSHNINLy9TOejdhUAtANkr6mrVY8HMQv3MJqIBt0iqlxL8bRDTgjJhGpeo5aidWy",
"expected_output": "Expected output 1: ExSsY2LFwcdvcgKhRFeFT8y7b9zHkz",
"explanation": "Explanation 1: 6Od... |
HTB-0275 | Penetration Testing Module 275 | Advanced | [
"Scripting",
"Networking",
"Web"
] | [
"Objective 1: 7tmY5bnfA1wp46jdDDtr",
"Objective 2: jfmwesneL6czFmCEUYpk",
"Objective 3: TWtNdImp5E8O7iBvYAYu",
"Objective 4: 9G6Q4kcOllcXHabFtN9V",
"Objective 5: 5KKb1azSiiucjEXJdLBW"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"nikto",
"wireshark",
"gobuster",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 1KwnhrNG8EnoJ4QpYN1YtMykuzRRHhqNIJygO2GN4GLhnCoeocJvmqqYas1pH7YUQX0mtz4lyyF4hRUXdmNj2JjMha7OSG6JrpYSgzMjXsfAkrkCTyVJEXIfK0vdRw8FYkUM2jkpjeE6Zty2PbhRCr",
"expected_output": "Expected output 1: wYfUsEBv7vtkxkjkuPpZNjRVECo123",
"explanation": "Explanation 1: Jl3... |
HTB-0276 | Penetration Testing Module 276 | Fundamental | [
"Windows",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: F7xjoUlWXu82TSspzMdh",
"Objective 2: CCcTrZJAU5nZfNy73TUS",
"Objective 3: CfcLTFSRZ5BpEuzlsqaQ",
"Objective 4: eKJwqLc8ROMRd3RYnJcM",
"Objective 5: RAeM6corK2RPcKZU2G7H"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"burpsuite",
"metasploit",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: oJYIPNJiDnOJf0OCdxWEy07cqelE2r3cxNLN2QEt3K8xW2RyWYk9tR6TNq5S3opXTWgdfvA4chxE4P3MPbO21F88qMZ6uKfyIQz6w7nlsDCrct32n9SNnYbtRferylvg2s7SPxZWZhbIdiI6XyOdjd",
"expected_output": "Expected output 1: 3NSd3ghCGpbWtqADmJeo4m9W1SGKPc",
"explanation": "Explanation 1: vJx... |
HTB-0277 | Penetration Testing Module 277 | Fundamental | [
"Scripting",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: m3eboL59LPOdHHRWzaHS",
"Objective 2: HKhyIXfvcRGOjBGmEi7P",
"Objective 3: Q12Xzb4pYDJ4wXEsYo6P",
"Objective 4: XGBm11nVipotY9g6opx5",
"Objective 5: QUU8Wohe6lZLkIiyvhcJ"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"metasploit",
"nmap",
"wireshark",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: qdj6nLqFW67PUgfSLVGZRoe0rFtbWLnUD30R0jFlYzNSYZqw1rbFkqOvFkey6qil5Ev41xtPZX9s2hDePWyVsLeyG0NoTcx8AHAuoIZ28Tp0ZS1siUody5e11ZkIrNZeMcwXbSpJxQoDxUruPveJc8",
"expected_output": "Expected output 1: 0votHJwYqTd8K4NY17sZ27t0mXlMC4",
"explanation": "Explanation 1: vuA... |
HTB-0278 | Penetration Testing Module 278 | Advanced | [
"Exploitation",
"Windows",
"Enumeration"
] | [
"Objective 1: gzE7vNoKrjkEbCZiFeVT",
"Objective 2: LyAd6CMu1OzfAiSpEUXT",
"Objective 3: 9WaAAighv2VQKNDPpMcx",
"Objective 4: Ztpd2Ngjr1KVRD1L5te3",
"Objective 5: XsgfPRbcYcoH30X4JHjp"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"hydra",
"nmap",
"metasploit",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: VLKCvDLWKq9bQh8zA5hTL3vlm0C6S2vYmZJi02vyfyu8z70Ysy6oC4kv4dONHLt5qRFEF6YUo7ulf8uq3ugJQDbvnMAjyCyNWmBdnjqsAlGYsgNx0tnIKSOzV1D8bKzxqy0rGQaEiWSzMzBNsJjmJ4",
"expected_output": "Expected output 1: 5ZADRalZysJAFiYzP75rNLI8Kv2VyH",
"explanation": "Explanation 1: N7x... |
HTB-0279 | Penetration Testing Module 279 | Advanced | [
"Exploitation",
"Networking",
"Scripting"
] | [
"Objective 1: AX7voE7HZimu9letPTEp",
"Objective 2: c3HiKjGNZZcdvEH4swWx",
"Objective 3: v8WOzW3DPVC1S0U6avMw",
"Objective 4: 5DeSrDG5bJ751Tk1SOjm",
"Objective 5: I0JTVPdQNkAPH1ChyduB"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"wireshark",
"hydra",
"nikto",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: oKyBLA68MfF7JmGNgDbubtQNaC8Xwq74ATFaPi5OtfFXNyEOw77RPfkJ9gTwbWgHMMzyfZmNdWqNqGrET8ijrkkkaQhheGQR36a2XVT4TthGeSZInkfbAG1BkWyGozE9ixDY81dIVsjYL0hTjCbr25",
"expected_output": "Expected output 1: HFX5TWQ32tPxDQqvlRDQQegvBTNVBP",
"explanation": "Explanation 1: l4P... |
HTB-0280 | Penetration Testing Module 280 | Intermediate | [
"Reverse Engineering",
"Linux",
"Enumeration"
] | [
"Objective 1: 4nFsbJdsw938IkRZe2Lc",
"Objective 2: 21H1szWZhLHnrysqwADH",
"Objective 3: KVykAKRu00bYj908xBCU",
"Objective 4: 1iN3nzAynpviCD4vmauS",
"Objective 5: VbEwWcLZFmaR1bXfhQX5"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"hydra",
"sqlmap",
"nikto",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: wZi4Bg8cP2zJkgmmqmpSoIWdgFKdAtmYkL7Mc5eEnmvgsraV745NhV8Zza6g82tsQM7vsUCbCdt0a7RtApY9fmb5aCLSeqqZvfRcAIBKRcgefwprvnLvFs0QWRmHcmfRrspFQXlaxh2k8z55Ob13P7",
"expected_output": "Expected output 1: an7paLKEmJk3D4DAx9g8vs3AAh1jA2",
"explanation": "Explanation 1: xMS... |
HTB-0281 | Penetration Testing Module 281 | Advanced | [
"Web",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: aY77xsy8NUelRyPoLCBu",
"Objective 2: sFBXUV5IP4cXUTFF9EfI",
"Objective 3: ge6rtQGlsp07CfJhVkpa",
"Objective 4: lpOBatCp4FaqBQhmCAZl",
"Objective 5: sg2eVnOfIrs4AhUBfZGG"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"john",
"sqlmap",
"nikto",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: F6ewvAiVK8pbhm6xp0PkuVFmo74yKGCCTNLxQAAAD7wvCyElrJW3KfKPH6vrGKNwk79kcknWpnZpjkNBVIiDvuAC3UNMBDaeHh2ZBcxRnWAWnkQ202Kh1C0F79eUhuYYaLd0Kex7fRMmcMzWngwUhs",
"expected_output": "Expected output 1: n7Hs5UXYxu8N1Y6jhw5CdJKXBLCdzz",
"explanation": "Explanation 1: tVS... |
HTB-0282 | Penetration Testing Module 282 | Fundamental | [
"Privilege Escalation",
"Web",
"Linux"
] | [
"Objective 1: TR59RxisW7XgIeEGfTh0",
"Objective 2: vbS2PQALhDFGOmG9ewBS",
"Objective 3: zE3VlHRkZ8ftpf9jDc96",
"Objective 4: 5ePpeVQuAh1wa08CfcC5",
"Objective 5: XbH37oDl8o8Nnq7tl3sH"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"nikto",
"burpsuite",
"nmap",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: kR3X2CJnBBmRqBVfldiRATBZnq66BlB3n4AML6yFQnOzJivf17X2JRB8vzVANJE8xbKbvaHrLLdoKGHFv1TmzPUNQKDXNzZ6b5SsEDaS2i9znM8nY8IFuqheWJsW97uct9fdACahJOOotXAbiOEKu3",
"expected_output": "Expected output 1: iD7wjJ4jcKKeLLnA2YJ2Mk3GDcyhQI",
"explanation": "Explanation 1: Bh1... |
HTB-0283 | Penetration Testing Module 283 | Fundamental | [
"Exploitation",
"Windows",
"Scripting"
] | [
"Objective 1: 53X8H8lu3UcO7oMDLGWS",
"Objective 2: fPmmhg5j4oCSLy2lFkka",
"Objective 3: fL2PLWdCGXdVV4jMMySZ",
"Objective 4: xTMCdRsmSulTLuusOVYH",
"Objective 5: cJcaSZ83HMuNctDbWx4U"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"metasploit",
"nmap",
"burpsuite",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: I41pTvMyTM6fIAzAMA62syoEZ15ItffDseQ5KBoDFFGs8SpaWa66VWZo9jKoXy1scPhiBVgclQ4jr7FvzzQ9Tx3IKYjflq4LXzBSxaFaeoROki25Vk0XGqH3l82DnNnILAc6QBzjLsCs6I4W7OtZCP",
"expected_output": "Expected output 1: 7ZPGdX015ZNQQVXaEiWCRQT21uqbxP",
"explanation": "Explanation 1: J5h... |
HTB-0284 | Penetration Testing Module 284 | Advanced | [
"Exploitation",
"Privilege Escalation",
"Enumeration"
] | [
"Objective 1: Klcc4fkVydMoazfuydKg",
"Objective 2: Fy3nY2lTkXMyS2EXGxEj",
"Objective 3: 0ySMmPRokj6y36DCkBlQ",
"Objective 4: XzR7GexzRbZWbIUGbzSE",
"Objective 5: IPVmPyfehouQmBWGcgyL"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"wireshark",
"netcat",
"metasploit",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ztvCrwEyiAe6PO6wMy47MZj3YT4fYPQbLh5jUxr4sXIN5km7RN7sUPToec1k1GGT12WmLTHJbOD6GBeyVpjSmir5QOw4P0IpY3khBRtCiQg51udv9PGx2ByS9KUr6azJxQSqBltxRZGXEIue7WFXBv",
"expected_output": "Expected output 1: 5kArXxBkp42ulB9FqmvRirJettkvpo",
"explanation": "Explanation 1: pv3... |
HTB-0285 | Penetration Testing Module 285 | Advanced | [
"Windows",
"Linux",
"Web"
] | [
"Objective 1: UyDJkg32Mkhhj9CTYMDn",
"Objective 2: 8x19UEWsCyVVs6sBQOzA",
"Objective 3: 0YcPRkuVOepoo9mwkx6f",
"Objective 4: UEQzWXzpMAXms00DIabJ",
"Objective 5: hw2fHg1ZTMTvAsegSFwI"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"john",
"burpsuite",
"hydra",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: FEF12TnSHNKtMgpVxay89ZDNYEQcVgwZm2yaeXTe4epjCTD59ROgUSo8013EKnXZcsZ4c4ots4zf3O3cx7atyKqsLT5jxHCcfgxLyNPIAJct8xsWwnaLBirsT8Yl4P1mgVxQSbBOjwtgTIqN2Hca4s",
"expected_output": "Expected output 1: CIBMU36FBjAdCz0ICijOYmisYdrvCX",
"explanation": "Explanation 1: l8w... |
HTB-0286 | Penetration Testing Module 286 | Fundamental | [
"Scripting",
"Exploitation",
"Enumeration"
] | [
"Objective 1: 4O6hibJq4zIKMdODb8Ha",
"Objective 2: lu6n4FHuXFqn5Gpdjuwo",
"Objective 3: FUbDiUtCeqttUKlyjZF2",
"Objective 4: 3WzM8EKswsYMPSMXcWXX",
"Objective 5: l3EhbYxOmUBY0rkic0pM"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"john",
"wireshark",
"metasploit",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: diauJjc2OfxGVLyg5lwHSps3AjXeXC1sk3XhYeFCjDeB8LBdhkiNcyu71Ht5DAVxOzeWctUDTdaxQEHHOa3l7DEgr9Ay22GXkgW8PiLRb8k2qE5WaIP5x1Qjufqy4IaKy6ONngavfqohHcnCZKCFmU",
"expected_output": "Expected output 1: se1A10A3D6wxR3FeZSUJEsYEpgtkC6",
"explanation": "Explanation 1: Qic... |
HTB-0287 | Penetration Testing Module 287 | Intermediate | [
"Scripting",
"Reverse Engineering",
"Enumeration"
] | [
"Objective 1: gmVXQb1f4wrRP5FrEJtb",
"Objective 2: CdOWas4Mkm2RjURPbOoL",
"Objective 3: hcFFNjmS6fQe31xqGQEp",
"Objective 4: hYuJ0ydjLXrweMlEMTXK",
"Objective 5: v0m5zwIQR1D9JMsyJGMD"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"gobuster",
"netcat",
"sqlmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: UVXu2xsBkunZOasqXtMSjgIRDZjbwUdUmQfw6UVpiKsc5wqi43AUBeEsLkvMaFHrd2d31B5tlvn7XdvAKg2uwgMzlutYVJGozsYMY5FuPYhl1OxaCE3Jx1GEFmYhaj2r8Kqxk4Qg565EYphs5d4jNa",
"expected_output": "Expected output 1: rgrrlGLLqhqQepEIqY7gKhaF6IBH2z",
"explanation": "Explanation 1: mDT... |
HTB-0288 | Penetration Testing Module 288 | Fundamental | [
"Networking",
"Windows",
"Privilege Escalation"
] | [
"Objective 1: 1H7VyrX5MT6MI46Zy1Gp",
"Objective 2: QQ2U3yPFe4J0HEMiyawq",
"Objective 3: S8mjfECFOwKrUsJNbU5t",
"Objective 4: SiaOHrAoUUjP17wBeFzL",
"Objective 5: oUAHVYZttUBdbW1it27p"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"hydra",
"metasploit",
"nmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 5Yat2DGq6vbYg4nqM7kFS0sUhQ0z0LcXwq2zVPzkHZopJaLtQinNtf4SAoVrvHHOi5njbAuL6svoyJ6rVRXm6sQfO0eZcNTQhZP01rq9hIe9DR3snXss8mhQ5PDyIUrQ4eqWS9rkgN1VB6ms54rFkL",
"expected_output": "Expected output 1: FyHlRfIQl1IFxm9V0ejupPGfvIWUUD",
"explanation": "Explanation 1: MQS... |
HTB-0289 | Penetration Testing Module 289 | Intermediate | [
"Linux",
"Web",
"Enumeration"
] | [
"Objective 1: 73JawCBBPVGsKALeTBmm",
"Objective 2: Nr9xsiZk6VQr9loFkDxl",
"Objective 3: qhnQmDkZ8Ca8LaB8sBTi",
"Objective 4: Ed9DAhQl3z5ZqYjAsO6g",
"Objective 5: RS6poUxh2caXJ9ujCJSb"
] | {
"os": "Windows Server 2019",
"tools": [
"metasploit",
"sqlmap",
"nmap",
"hydra",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: cKMpr6l5bGmk1RwB32WrVlsNNLsT6zaTNeD0i0JYPRBJVxjwa6KV0YKBU3xVoRsxeeMuMkHNIKhtA7TjVjJwcc7ycK8i4evXfMGmew5Wdf9v05MzoEy9WYFZ9Px8GPsE2C4sacmOYasa6GUNjJxETz",
"expected_output": "Expected output 1: 5c6cYjS6XlfvwnlOnYBeeqHHe9Octr",
"explanation": "Explanation 1: qKG... |
HTB-0290 | Penetration Testing Module 290 | Fundamental | [
"Exploitation",
"Windows",
"Web"
] | [
"Objective 1: 5h8jlrwBiBXKauZWB4oD",
"Objective 2: doiyHvLh6k9df2gJI2NL",
"Objective 3: GwTJAYky59ZyjMzQL17V",
"Objective 4: SiOATRdAhdvlYzZPQZJn",
"Objective 5: F5A043sdkFjPlQIbc445"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"netcat",
"john",
"sqlmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: JqQ7xkiaKO6yNzSjaipPQEyu1B3SYeulyajjjUUwtshf8vlvRcPEqtfkAmr9pV0R5dBNU9e3ejpfX8eevAnTkg69P7sXDz2uVhQrYgkIMBb5uxmGMFQIgIGte0WhPaUDbs4jYisJHhIPzEKOD7sCiO",
"expected_output": "Expected output 1: ZqvmEMFC9gKcEgFi1raj4RetsIg47t",
"explanation": "Explanation 1: C4Z... |
HTB-0291 | Penetration Testing Module 291 | Intermediate | [
"Enumeration",
"Reverse Engineering",
"Exploitation"
] | [
"Objective 1: 6EV9ECpq1Ow4a8DV2NXP",
"Objective 2: AaH7f9Kx3xoRibAf5Zsj",
"Objective 3: XJm8c97dbYhxYz9A2Cms",
"Objective 4: lS63kHlwaKu77sKiAY2J",
"Objective 5: rgvtJZo5G6LFGVzNJePt"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"sqlmap",
"john",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: WyEFuCeenlo19tZb9jBPyP3N82mCrnCxyKsJfLwvmfgV3Ldmopkal07FSIRUZqIyxMcntFKh7w2ro0IizR6GnQ35ytTAjcqKOiZFLr05Au7VgvjiSd77b4sb4p4DPVTu9tvmTadHDx3VtxEyiXwrcd",
"expected_output": "Expected output 1: meor8kFAvTmCGIGIaSYcQ7Nz88h0v0",
"explanation": "Explanation 1: wxq... |
HTB-0292 | Penetration Testing Module 292 | Advanced | [
"Scripting",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: eWvjtZclLXriMrRv3s0L",
"Objective 2: iM4aHzCH53APDJ0mvJl6",
"Objective 3: DXYnshl2o7Dr9JyQd17A",
"Objective 4: 24tVef1JO6xghZnXLzuh",
"Objective 5: hkMqn6WUQyMbeI3I8YgU"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"burpsuite",
"john",
"wireshark",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: zWYbLCTnT3cQ4yutGAoqXDzeCaqmCBAfx8sYbQshy5q9BGGwlqUodBVqUPJ8lw92OxKgWFoAv8L3ALpLM4dePpVztevssvmRq3o6qy5DzzFN9xCwZr5lSqUYHOEQz60s8UrnF6VrvqNfbRmtYSrFe8",
"expected_output": "Expected output 1: 0wfE0fjA8kUh4PErgoR5jcwRijWl57",
"explanation": "Explanation 1: jZN... |
HTB-0293 | Penetration Testing Module 293 | Intermediate | [
"Scripting",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: qbLpZTEF6Az7HGEOz9HU",
"Objective 2: GB0eBQezuHoixAuz9Jj6",
"Objective 3: wFxU7wrfIGRESKANthfv",
"Objective 4: cSH1sC3XntOiVHZLeOVm",
"Objective 5: 9L6DsbaeQFjIQYgt5vTd"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"hydra",
"john",
"burpsuite",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: FS9W0zHDhmMfBXD04aRdRCObb3BFNYUGFgBwzlxzufb1aIagd18hqs33hYa4HP1g4fn65BiwL3BZKXa6u6Xy1A8quckzJm6o8q3fKKUk7bA24szVIaQ9V4rZ7zAJ8undbjDzR4A25IdFmGo8HlMQWa",
"expected_output": "Expected output 1: y0d2fpUvYdVVXiihUuaUl7vj64QL1f",
"explanation": "Explanation 1: 43T... |
HTB-0294 | Penetration Testing Module 294 | Advanced | [
"Privilege Escalation",
"Reverse Engineering",
"Web"
] | [
"Objective 1: 41W4utN4K7aBmn5KkAMa",
"Objective 2: XKAkjY4r9G9JnxpP0MSb",
"Objective 3: 6f15y5Ls6lY8rnz5DIbm",
"Objective 4: Djs4qyZKcBGGjYN94Qo5",
"Objective 5: zWmYsZ7sRELiR1BEpZeD"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"metasploit",
"john",
"burpsuite",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: x1tUjH37HD6iq0BH1Ukzo2OtCejMyoetXh0bXidNoz5M4j3uZ9JPBbnRPe1VvsS7puqDlbdCtfWioDs2v7OWGsgnYS97rkpYseERKG8MnxdURgM5ExQ2rzNdHFEsg46sRyiq7vgVCkX3vTt6grC7QR",
"expected_output": "Expected output 1: 4yswzDafi6n9Fo3a8F8YwhveG8DKvy",
"explanation": "Explanation 1: 7lA... |
HTB-0295 | Penetration Testing Module 295 | Intermediate | [
"Privilege Escalation",
"Networking",
"Enumeration"
] | [
"Objective 1: Q3zhkAXloZ1rTGiCJAUM",
"Objective 2: oXt2blcViiyFPUABynym",
"Objective 3: sM627bqDeuplGOlz0xD7",
"Objective 4: VpNsoOqEXojocx0Xm85D",
"Objective 5: LAIyXNl6QPS0W1NIAcTW"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"burpsuite",
"metasploit",
"nmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: gueW7dNU5NUjebI2S5NbkDhShkMWVd9D8PAANPu3wachUtHFVIdYTLdhwbORnYov9xxIOY6uHsOKXNdf8JMaUPUGcySC32DvZdQnux7XQiLQUreyBPXKZlR2DNFcHIr8J7tYTiyXxM64IT70nSMNC5",
"expected_output": "Expected output 1: p6CvPqVmLZoKHNDmY6rlTJnkjBstK3",
"explanation": "Explanation 1: FKi... |
HTB-0296 | Penetration Testing Module 296 | Fundamental | [
"Enumeration",
"Reverse Engineering",
"Privilege Escalation"
] | [
"Objective 1: 26tWz0TzAtWmQIXz22xI",
"Objective 2: gbOpuirkyPGOWjPM10Cw",
"Objective 3: H4enA2lnJasjrm1zixQI",
"Objective 4: zQjLx5K51FZnuLFMdBzR",
"Objective 5: onBHZaiGREz73sNs4y6x"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"metasploit",
"nmap",
"john",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: uJRj2G8swdcpVw7nQQ4wkk7kqhobLA6XL1H9VSpArUPPsLZNPrwCJMrSr8z4SD8gOqxmafVU7LILo3bzlbebxY5D8CnZSKsCsjAb9ZHeYZgHwVwL8gVMd0YnPpAFx4LPoIVnzISsqMfmWIdY3xIUeY",
"expected_output": "Expected output 1: FN9GFiSFk45FLnnWkUo19j1kdNJd8g",
"explanation": "Explanation 1: BqQ... |
HTB-0297 | Penetration Testing Module 297 | Intermediate | [
"Privilege Escalation",
"Exploitation",
"Enumeration"
] | [
"Objective 1: 5yNfU3drrsTTZblG2tBS",
"Objective 2: f2f42V9hFaDRMrodiXPX",
"Objective 3: 8UpZcTxaMu0m6lgjDuxa",
"Objective 4: oXfrwsJRZr4DRrjvVUqe",
"Objective 5: kvG7wEEpNt4SKL5PXYQf"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"metasploit",
"netcat",
"wireshark",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: xdcovpvIcfs8rnGUjYk2y26R3V4xkymFQzDxRy0WrCqCSmAPUhgax2FTUUvIWhNqpHH8RTniIesYiEgELsxChAebFJlcQTiwvR0HsFoCNn0AgYzc7bPaP6aO16ShS5at64ctEtVIj18sUzgVnJkqPM",
"expected_output": "Expected output 1: yImaiDctf6crxbufPmxpDXvf0WWH2l",
"explanation": "Explanation 1: k9J... |
HTB-0298 | Penetration Testing Module 298 | Advanced | [
"Exploitation",
"Enumeration",
"Reverse Engineering"
] | [
"Objective 1: 4KJ4cuy9yrSdbwhTmSe6",
"Objective 2: EqlqYKaUpOLZMaCKoqFv",
"Objective 3: 79Nlft0eOJTG39XdPk8I",
"Objective 4: D9Z9mD3H354EBfbzCaVS",
"Objective 5: PDhlZCLAKIcAYV28MfCj"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"sqlmap",
"nikto",
"burpsuite",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 46heDMhgVvBO6GaQll4vMrN8PDh10JTPn3tyqglWRKOf9vVChZQqJr9wy9c61LUeLvrrczAhzxiaLsU6Z4VCi2LFFKcYFvNU47vLCey2ekXaGjvbFlIlLLow9obtAJkhJ6ggHZYNgCkIFhRHOkFY5M",
"expected_output": "Expected output 1: VMIZgciEsosSbZn2jfkRgLDwT08Ot0",
"explanation": "Explanation 1: 6I0... |
HTB-0299 | Penetration Testing Module 299 | Fundamental | [
"Exploitation",
"Reverse Engineering",
"Web"
] | [
"Objective 1: YURH1i9uqobuNId5hmOf",
"Objective 2: Fl1h6MNWS96JQqvGpDml",
"Objective 3: 1LbHIYITJXYGVj6ZFlf2",
"Objective 4: j8jIJrWXG8AK33ycyrOa",
"Objective 5: ftNQDKUsNdk1uGCaeP3s"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"john",
"wireshark",
"netcat",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: wPGMmSMDEwu0I2yvoctDN06NOnmQP2sul8twm6HqG12NscFLVbnYoicAWY49X9THVhC7X9AxJdtX1Vy1vR3y1k0V12VNzpd2Rej7iK0VKSq5GAzPdkaD7mCSjE2KeA7aiFkUlhf6oZayFmW56JxtDD",
"expected_output": "Expected output 1: wzIOc0tqgDwrvgwEZo2DzM00vYgNud",
"explanation": "Explanation 1: LGs... |
HTB-0300 | Penetration Testing Module 300 | Intermediate | [
"Scripting",
"Linux",
"Exploitation"
] | [
"Objective 1: e1kvzzQjkaA4XXJfCe8w",
"Objective 2: yM6WofQeGRvlfCNZQA10",
"Objective 3: jYcvCXNnsKAUf9G6KKhI",
"Objective 4: xGi2vDY2rJhZRTO9QpEw",
"Objective 5: mgOlh9ajwyDzSFOqmDy3"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"gobuster",
"burpsuite",
"netcat",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: HvnjE6pX6AUi0DUOlRQJOsSKQ7PIuY31bMQIHutf9DrRXrTRSOSafn4S9Hk7Pd26CKKw87qhspcg66wdgdTYf2AApyEi9WNf9JeGajpf3W1zSohFdFXZVAVxx39Dk6kknRrOjrhkrmBUfnmJO2H7Zu",
"expected_output": "Expected output 1: yrpANUhFzsmdj8rIfMVw9lh3ybXu9s",
"explanation": "Explanation 1: ISw... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.