module_id
string
title
string
difficulty
string
tags
list
objectives
list
environment
dict
tasks
list
HTB-0201
Penetration Testing Module 201
Fundamental
[ "Scripting", "Exploitation", "Networking" ]
[ "Objective 1: mV0AsKksiCmoTWHW1BiZ", "Objective 2: KXblFOxvdIJtjdsViU5l", "Objective 3: k7E3vF3sVHMmrQkTgD0v", "Objective 4: i0medn8puWW1TRxqH3Kg", "Objective 5: wEaGKPahAwBryfiG2k20" ]
{ "os": "Kali Linux", "tools": [ "hydra", "john", "metasploit", "wireshark", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: RsAy1gRgkRubdkt48XKqYFJ0zXnjXGiSHYnZumD6s1y051xqPuAKElpsvxT1TDUNWSoIDcnIRW91IAzDKx8Sc4Iv6FyecH5Djt1icszlwXSvDy6NPNQCmbcVU2CHHx45G9I21yCn0dbdcxAygqCD4A", "expected_output": "Expected output 1: JsxNWiqcXcp176pXj08osN1ui2KjjK", "explanation": "Explanation 1: AzY...
HTB-0202
Penetration Testing Module 202
Advanced
[ "Networking", "Exploitation", "Reverse Engineering" ]
[ "Objective 1: DrBY424jQbnrJhNIrOdj", "Objective 2: 7WIGUSKjlYO2ymqvPqVr", "Objective 3: 8HzdY2XZG0OKIiCrdNPt", "Objective 4: e3XtIKTtS850UPa7gMu8", "Objective 5: OaUWCkjUBUfGLwVsX1Rc" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "nikto", "gobuster", "nmap", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: 76Mv6hCRhnFhwn8uKMAOA0SnAJ0NdnEsnwhQt0Rqe7NY9aVLMqK5QQ3OLIFmYiCmjm9Lhm1riuEOvqLs6WO2WRdKR5SJN6GgWtjFo0wM1IN2jorVNvNX4DdE7QvNxhbcpYg6flU3wZyhVFyo1cT6G3", "expected_output": "Expected output 1: 6ZZe9JtgRu6MnMwYKX4r5q4qLXPJkP", "explanation": "Explanation 1: QQF...
HTB-0203
Penetration Testing Module 203
Intermediate
[ "Linux", "Enumeration", "Networking" ]
[ "Objective 1: xUWN5Sgoj1lIrE9ORGdA", "Objective 2: YfysXcge47y8korSZrkr", "Objective 3: DWCi2lgsL0xArAOJpEb7", "Objective 4: U2mnHRE7g1YXDQFLSdJE", "Objective 5: hMOokwWD8M5l2sqkHAkj" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "nmap", "netcat", "metasploit", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: CBKifuJOPRolabViyizZDwUhvujOwtS44L1rtkXCq1cnjhJ3TBrQRuakxOldvLjZ07aeg5FPLVZZvDnMqN1t7s3UMzcxcwBpOqfwYaaBi2nDgZn1pwyMCHJvkbC9AcrdT4PN5rMEWhoOv9i66caWio", "expected_output": "Expected output 1: MpMsyiVBQEGED8MNMaBA20NZZG8ana", "explanation": "Explanation 1: JXQ...
HTB-0204
Penetration Testing Module 204
Intermediate
[ "Linux", "Scripting", "Privilege Escalation" ]
[ "Objective 1: z6XjwORY4EQJ8RbBM2kT", "Objective 2: sadV5dxU31BGfya9G7yz", "Objective 3: yA1M31TULyzt0j8FKls8", "Objective 4: jaRQMmcVrc6ydGfpkZzh", "Objective 5: 0HhxzGXSqb1hAg5BPXIj" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "nmap", "netcat", "burpsuite", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: 9nZY5WdtvmKwHgcqIdMMudsRz4wbArcwqULchOOB825680U095WnPmX7RzTCkZWQrySezjnSpJAU78OifPwURCySW2rkhg2ymiCivnFH1FmdnmpWYppssBUfi2ih0g90rBeE6hBb6qQymsBLrpnYvP", "expected_output": "Expected output 1: 0FSXWpcQUHZBPg3FReouHrWUWvUs0N", "explanation": "Explanation 1: EsE...
HTB-0205
Penetration Testing Module 205
Intermediate
[ "Scripting", "Windows", "Linux" ]
[ "Objective 1: vRhiNeAGluyMb9dubxZR", "Objective 2: fOdZoC4jUej4bk0Nncdx", "Objective 3: ii2yrDf30XyvZOqSVvJR", "Objective 4: WV8uI2ta1JDEdh7pI3IM", "Objective 5: 5T7uSYhFTLJ5kzwWQfH1" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "nikto", "sqlmap", "wireshark", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: ix49UNjty4kB0UWgoElgjePaDl3r6OoKQXhIMxY4VrSwD4ocw1AbunvxHzHcq7PnB699jUjgIqXRHVgVRc2gQhxAViANlSVFYEzIIykfKwiNOcPTKdQ8sXDCXrLdTJWB5LwH5aRyogPcWxM0wESM81", "expected_output": "Expected output 1: F1AajdpSZAFrz9I7VjOY3garUP169C", "explanation": "Explanation 1: f8f...
HTB-0206
Penetration Testing Module 206
Advanced
[ "Windows", "Networking", "Privilege Escalation" ]
[ "Objective 1: 53r8wFg8yhSrAIboY8kV", "Objective 2: PJsPM770tr6HZ8ZInk12", "Objective 3: LsMdCOapECdPAeARgpdX", "Objective 4: 7LNZUEnIZ85qeI7y83xJ", "Objective 5: x7J7kQbFJiNp7pHFq3uo" ]
{ "os": "Windows Server 2019", "tools": [ "nmap", "nikto", "burpsuite", "john", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: YNgEh08fyJNgcjdqaRwqp2pPh4ZEL80SWe2P0T16MpH65tVLLiF76KAb6zP9nL3aXyqjciR9vyqIBfLFHbmwPVjOmi6kODPOmDXJLag4Ab8rzox76J2ZpX5kDXErsaee8Fo9wqMvWsrq0HtpX8kYqN", "expected_output": "Expected output 1: CQNjsR08q6bdwQ9G8Ab4p9104WYJEh", "explanation": "Explanation 1: pZh...
HTB-0207
Penetration Testing Module 207
Advanced
[ "Scripting", "Reverse Engineering", "Exploitation" ]
[ "Objective 1: GcOGIrfMf1J4YlLXLhIo", "Objective 2: PLWoYXHlX2WZjNTZx6iX", "Objective 3: wcVHoNfTwpG1RP27GzXk", "Objective 4: ldScdSIV4iVMct819yri", "Objective 5: 3H4QA4piE224ejAXsIcg" ]
{ "os": "Kali Linux", "tools": [ "nikto", "gobuster", "hydra", "nmap", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: 1h8c02rcmrN9nAnAfY7jDyWDfozlhBXB6KEHsBUh04fEntEgyOBo7366g2av59EMUIwQLHkkZXAfsqw8dnIOaUlZZ77LVYoBxKbvj9EqEr3fQbHeyZHllqNTW84ZFMMhNWH3TDVjNRReshgXgDPuFK", "expected_output": "Expected output 1: iZ9RvSDmPATNgV2FlF8s6WgoqZY0P6", "explanation": "Explanation 1: iy8...
HTB-0208
Penetration Testing Module 208
Fundamental
[ "Windows", "Linux", "Exploitation" ]
[ "Objective 1: CR5nz5Pw9KBoem9dyAQC", "Objective 2: glWi3k0ZamuFs0OnNZJk", "Objective 3: D3PYJ6Jb19zW1lttzbuc", "Objective 4: KRKMz3mFYxYq1C2vXMaQ", "Objective 5: mQhREo8EEN2R2eBcUr31" ]
{ "os": "Kali Linux", "tools": [ "netcat", "hydra", "gobuster", "nmap", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: MJLRDlFt7BbtF0Ovi5bw45KQxCvHQsA9csc6U0KLGlS5MHcqxX65pUxn7J9auhgdqp3WN7N92H3iuMmBnJ1xwCcptq6fQp6oKBixV1a4E2zwekDsHGXdhjKmM1BqBfPJZshIGYilGiUcMfiQITuVfl", "expected_output": "Expected output 1: PxeUwJuXyXjVetnh3nkZobX9jW8rXT", "explanation": "Explanation 1: KGx...
HTB-0209
Penetration Testing Module 209
Fundamental
[ "Reverse Engineering", "Enumeration", "Networking" ]
[ "Objective 1: CMxGQNj8GaWZeMzQwVlo", "Objective 2: tj5KSydh9lwaTlDjLDJO", "Objective 3: APIezRLaQ3ZDfXHDho30", "Objective 4: rVyC8Xv9lTHE0Az8Ik3G", "Objective 5: 3uAXwcQjBI3ECj8HQ7kU" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "hydra", "sqlmap", "netcat", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: KJyEES6o8ASB712hgP4GRKw6lIvM1lONdwGMVuL6WcU3XQxEuz4VLNtOejwPZhpTjTec4TxTFFkvHXgZW5oqXkQ4D79Ds7pJbhsavA0DFpUnlzcJsWZzOTtDKw4q2N0FvbQX9REYojFUGkvfyYP0Ko", "expected_output": "Expected output 1: J0xr91Hsc8AQQowNQqCkWfgA3VtXXV", "explanation": "Explanation 1: b0J...
HTB-0210
Penetration Testing Module 210
Advanced
[ "Exploitation", "Windows", "Linux" ]
[ "Objective 1: Ca81j3UrnJpwazsKJZiU", "Objective 2: wasQfRq5c35oeyX5EC3i", "Objective 3: nVz90edqkZ8j6dJZux7r", "Objective 4: 4Hx1nKhy3cTsqUVViHfg", "Objective 5: a3zMajmOHjKWzcAhzc6K" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "wireshark", "netcat", "gobuster", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: ezZHetoY0CCv5aty3zx8Y84fjaX67PZtpSNEfoheCeahS3jYxJlbMuNRSmPtkwKTO5rLeUVnkDVj1afSqmcZgmwbtDdjpcxyisD2lMH76pns0eiJ3uzFKCwfSCWFZFNuWXnkxaVnLdk4rJg1JM1KY1", "expected_output": "Expected output 1: 9AnT14ZealXFAE01TypCStCPMmNToe", "explanation": "Explanation 1: hLn...
HTB-0211
Penetration Testing Module 211
Intermediate
[ "Enumeration", "Privilege Escalation", "Networking" ]
[ "Objective 1: uuf0m5ZjkdMC4kp5z6Lu", "Objective 2: 2MlJvD9JV4CI0xtMNxm6", "Objective 3: eH28cGBxPzD4xECdqmd9", "Objective 4: 2pO6it7FrqD8w6OOt24c", "Objective 5: eR3o4E9q9UcuWNkFfS0E" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "metasploit", "hydra", "netcat", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: XRVMFrAM11E6ZYpDlbvVZVpCua4FDBpE3yjU4tdYEzxELEfEsSNOEvfz35y8tftBiCcoaIKenclWRtOWBVGan8uL5Sg7Qz216SZOve6Vnqb5id4TrZBfNdZS3CFG1RxGEQzMLxUEMAjJO4sR7H6Vyp", "expected_output": "Expected output 1: c4UYUhfEp8miTSutSDTHe3RjgyGhlp", "explanation": "Explanation 1: BGb...
HTB-0212
Penetration Testing Module 212
Intermediate
[ "Privilege Escalation", "Windows", "Enumeration" ]
[ "Objective 1: QV99M0NRVQKwHkQlZYqF", "Objective 2: goqYCsqLHJQJ8UU5etm5", "Objective 3: 3Cjav6fm55McRHs1JjIm", "Objective 4: wN7gyTnkpr3gSx5O9OTt", "Objective 5: DhF9T3FcEhhf1azHrSpb" ]
{ "os": "Windows Server 2019", "tools": [ "metasploit", "john", "hydra", "wireshark", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: tGGL0AY1GnwPcQ86WJIWDjvqTgYFjUxKEr6B0VgBaCo95rVzLmjaqHfxDlhpSJr2B1VRJ2zM7U9X68pQonDSrUJXzMtyWACwtne8cSNpL0H2JmhfbYIuS3uJSu6Mpm7b3uXnbxyWVCSdYe2y9ZY6g8", "expected_output": "Expected output 1: 2XRosE8xckpz4SKVaXjlDzMEFNGqP7", "explanation": "Explanation 1: bxZ...
HTB-0213
Penetration Testing Module 213
Fundamental
[ "Privilege Escalation", "Networking", "Reverse Engineering" ]
[ "Objective 1: d5VPwrQWpvu8BIrfvIKC", "Objective 2: NUyrR8MjttuBBitu9cMz", "Objective 3: jY6P98LBk6Ykmw44LHk8", "Objective 4: pxL5X7o7nMV8hNCbBMcx", "Objective 5: N2wOl9S4OuektWBkKpgs" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "john", "gobuster", "metasploit", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: UniLgbJ0mW3JN21S7DGjZdHeVyNCoN9sr8SjWk01NrOyXzMu2JpUd8GCjWoF96GV67DRwZCN2mheeFfxd74e9VthFgnGLkjDHmzy2VOUOmPkDSj1u7Z87tZpiRtQ3yusNuToTfLj6gS9n3E4S3RuBR", "expected_output": "Expected output 1: rBPU7TLsk8Dz5F5TPyW3tUQxqBZtjW", "explanation": "Explanation 1: ibe...
HTB-0214
Penetration Testing Module 214
Advanced
[ "Web", "Windows", "Scripting" ]
[ "Objective 1: lJPQhC3ruigsSJNWrhxS", "Objective 2: tiAy97bifRoaRP1TubRY", "Objective 3: xoamvheS6jnI5hVPq9hS", "Objective 4: gTqgXsB9wgFNlj4IE2B9", "Objective 5: ODf33nDRuBsmtuuGX6TC" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "nmap", "john", "nikto", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: Y0JUwwHfi9u2mlFGzoh5r5L2G1j4jzLivUcDYyI6vqn42JlpzdXLDVq9WMy3Fh3VILNUx2ZclZKQB9aeWeUZVXXPqoPUxHgORX8wpphCKB1mykLxbsuSEekUbSs4quTvVu9jCRZ6wakKccxzsdpmr1", "expected_output": "Expected output 1: nrT2yoGMCt4SYlGdf1HDre1bezkAbF", "explanation": "Explanation 1: x0Z...
HTB-0215
Penetration Testing Module 215
Fundamental
[ "Privilege Escalation", "Linux", "Scripting" ]
[ "Objective 1: gvJhhAVuVsu7IdtZ8Lwp", "Objective 2: NdOV4tntXTqDUrN6fhQl", "Objective 3: dXehL02K7w6JhOnFluwj", "Objective 4: X1aYIBexY13j2BKLqC5m", "Objective 5: adW2XL29HZLkqLKcxoll" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "metasploit", "john", "sqlmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: rYqyxRiUrVXTyyZhZRoBxhWkHfo8a7dpgg70N4Mv2wL63M6NOr61usS5Doue0aMwInqBZ4ZFzxkN1HQfwNP7zLG9biCNkatqhVRDipl21Aq3yq6x3kF88t3xGBweaSYbLBn5RJgsh4B1NB32GXShcL", "expected_output": "Expected output 1: eKigXKZQwbo6oJf9R9M0V69cv49aO3", "explanation": "Explanation 1: JZX...
HTB-0216
Penetration Testing Module 216
Fundamental
[ "Linux", "Enumeration", "Web" ]
[ "Objective 1: fdvVPmfpW3SrjxdHv8GY", "Objective 2: pogNcjySUB1xHqONFxXn", "Objective 3: 4WhoqJsZLA4vMxg8Smof", "Objective 4: E1j1wMdX0XKWyP5ibTpf", "Objective 5: y4SfWQLdEXWt9WQ6qWAe" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "wireshark", "netcat", "sqlmap", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: y9LKti85SuLu3kVKrIn0x8moRMH0RaE58a8aOL4E9mM1Kc2kvQvR0eBuR4lneEPrRg6Q15DNj5ZW3Wef55FqowLhlfdvZW5RmOirbNIIsaGVyM24pQ37hf5x0CaUElgv7lsWBfjjzaDqClG1Vt3sry", "expected_output": "Expected output 1: VO1ivB0YLLfIGk7YcIwbLLsCThqDHP", "explanation": "Explanation 1: bQA...
HTB-0217
Penetration Testing Module 217
Intermediate
[ "Privilege Escalation", "Web", "Networking" ]
[ "Objective 1: MGzaObErWJKj84fgU0H6", "Objective 2: SxKzyshKhifOsZr2hJP3", "Objective 3: FkVcB6qS5Jkk6JLhFNfz", "Objective 4: 2GcsDqUDI393SXMVLq0h", "Objective 5: Ce6QqaaXhDzVTb1ZwwxV" ]
{ "os": "Kali Linux", "tools": [ "netcat", "sqlmap", "nmap", "john", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: 7Q9kLcIfRYL7H5lZJkCCcfZIhtoay50LDQRtDdPnVOMYllAIhm0FTmj7ABEUsLJ22Dkzgyvecrnn0dutxZ61425aSuXo2Tdp929bxnKF2ow9nqUKZtmj9pHQJ6yCyBfYi7aC1pdxIiZbL5S6K3Ul7l", "expected_output": "Expected output 1: chNwfGpwuqZRClBr9jUFJhsYqrR2v4", "explanation": "Explanation 1: ZLS...
HTB-0218
Penetration Testing Module 218
Intermediate
[ "Enumeration", "Exploitation", "Web" ]
[ "Objective 1: yZThxldqMUIQXArv5DHe", "Objective 2: 4aWP97pgmZpH19tVNT6K", "Objective 3: 6Ccm0r8L8nmKx4EhXtxa", "Objective 4: KSHPiQWSyzllE23CCUPU", "Objective 5: xmZx0VJtouUULOk0jX8r" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "john", "nikto", "wireshark", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: YN7fWLvTc1hzC70y6iKrhX4iGx43M8vrnyPJTDysFcKhawuxRB6z5gWSAruy07DlLXuxoTIvxGlj9e7OjiBKaTzVoWsnEfJkR7TyKLjJ4495UiPpNmnI2ejS0LGvL78ILcyRrKV8VgWIsCjico80jj", "expected_output": "Expected output 1: Oh1etge3JNVvNjA4bBiPzZf2SWZqMS", "explanation": "Explanation 1: 71n...
HTB-0219
Penetration Testing Module 219
Advanced
[ "Enumeration", "Web", "Reverse Engineering" ]
[ "Objective 1: tmL60hxBYhY6vjLDFosT", "Objective 2: tLwzm31xA5Jxi477kJB4", "Objective 3: WtX72ZmV2DHIL2TFyQHI", "Objective 4: HSofCL31aP8BBpA3Kw2p", "Objective 5: u3hOzJSqbO0y5JGjoz2F" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "metasploit", "hydra", "gobuster", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: qw2DkBBV5Q2FsS5plkmljVTwDmd0x1bmvfkjONQMLIkwPeZ1yar10UKpqVg1IsQOI7SAlh3lJUFNJHDStLJ2TIHtnuh8b2qVzaolBssZD9duV7oQ2EvojuzqQH5pIMRp0s8gBwspLfy26zO2zLsXFz", "expected_output": "Expected output 1: s3jtAL9SHYXnochZ09LxzV1dh0NVy7", "explanation": "Explanation 1: sgj...
HTB-0220
Penetration Testing Module 220
Intermediate
[ "Windows", "Scripting", "Web" ]
[ "Objective 1: 9icFRNOWYZaatPs0LEJr", "Objective 2: lofN4DNGArW2ulUzq8N8", "Objective 3: M8D5m2MrfZGlq1uuXstP", "Objective 4: ePFsnX9RQuNysRs7r9o5", "Objective 5: QWbXjXMinRhXk5KZOYfe" ]
{ "os": "Kali Linux", "tools": [ "sqlmap", "netcat", "nmap", "nikto", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: kFVqmvltfydKdPdOXghC9nsglUZ1c7AkXw8QvtxyB43nMH04njxdOjRNM0VTYf6zeBPeKZeFt4XefdlJamZvAyjyuiei6g5Hw2WT0O4BKvgNUdCe5YgM3L5XXssemXLbUqjlM6XyTrGN7Vd5s6Xolp", "expected_output": "Expected output 1: F3bRNr4CNWc6A2mKyAnhHfTjCnpwBB", "explanation": "Explanation 1: KVj...
HTB-0221
Penetration Testing Module 221
Advanced
[ "Linux", "Reverse Engineering", "Enumeration" ]
[ "Objective 1: Qo89igfvhOiqQsJX6gya", "Objective 2: 3zswyQcwV1pGRjMdpjc5", "Objective 3: R3OVhaSPzp2XYcUdHcu7", "Objective 4: CkBmu5hQWS6DzNH7QVhG", "Objective 5: ouVfOSeNs1U8YMuEr9vX" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "gobuster", "netcat", "burpsuite", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: rOUxiZNg0M458ZnW39yqNbUKfl5bU72Hh9lZSE3L4COOOyYEtqFzDGOUksXQgfmnY9Y31CaBoEYMOjMQTnfUX3Rul2OgstP5bu8gXXp2uZpQn2zhdB6zaCeWSCZ3o7nqsc2JIMWTpHl3OmqktUlX7f", "expected_output": "Expected output 1: 8SzvR525sucezgU2SfBncrbdGNUYXp", "explanation": "Explanation 1: Nw1...
HTB-0222
Penetration Testing Module 222
Intermediate
[ "Privilege Escalation", "Reverse Engineering", "Web" ]
[ "Objective 1: 9RkbX9Jib3vb140MVota", "Objective 2: z7lBxHRg5SHFBN5kHVRk", "Objective 3: xjrwd6AJx7eTmKD2fuah", "Objective 4: srhO4VK22165RG7NLkJ5", "Objective 5: qXRkvMZ2fckqiAqB4AZL" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "nikto", "metasploit", "john", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: Bv3vJCnWeTttKRzSdVwrCljgIPczxJVl1IcO9F0ykWrYSs9oaXVBIV1e4D3sBLn1kuGxmN0gk3SljpWGvzvg0H5LUfUw6lPflYDww3SkTn3Q8jP306AcmB41D4yJEaedOvlFBWuYlxnSpksfX6z4rw", "expected_output": "Expected output 1: qFBvetu4Qlth112WvoC64qWjasG1yD", "explanation": "Explanation 1: kgD...
HTB-0223
Penetration Testing Module 223
Advanced
[ "Exploitation", "Scripting", "Reverse Engineering" ]
[ "Objective 1: IvqQiSKpvanllyjhqknh", "Objective 2: 03i5vyqeYOU5P6ayfgzi", "Objective 3: ZFDfPZMyRsMwN2cl17sV", "Objective 4: lu4KMa19gRm7XeZsmziQ", "Objective 5: f60oP7HsHO8ra35Nyyp2" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "burpsuite", "nikto", "wireshark", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: m9Az6HJ1CFETeDnuliVQ99M1bTVA8gSb4GJb8DvekEoVpkXpMS1ZQbMWSRMIEKBdhIXpfoD75jwA6Cbuo0m1e13scdKG9UfifsfWOxuziqCCGWUQZ0ZLQ6Fs8SpA8Dv1jGDuTPpvhiW7Dkc1nI0qpK", "expected_output": "Expected output 1: D7sGWXbA9QgxBToXEp8qoBpPl3szwn", "explanation": "Explanation 1: Vpj...
HTB-0224
Penetration Testing Module 224
Advanced
[ "Privilege Escalation", "Linux", "Networking" ]
[ "Objective 1: 3T7jgM1L6oBg7Q5k05dH", "Objective 2: p1QInrqJJWae1koiRlRL", "Objective 3: iFbCkYANROGmeX9hNveL", "Objective 4: lWpGAK8I3wWwhDlPTCJb", "Objective 5: StNPl32KIJZtC7Qe7Qkq" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "john", "netcat", "burpsuite", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: PGIGHEpXEZ05dVVnYTjAb7xajxV4RdygxGmpkmi935xJSzBvrRXYuqAUd9Pj1vbwOpf7dIK7znPO9tuOmPhS5kMPmlwsYJqKz2FthvvJRecMShoKqoJodcFEzBQIyJ7L34TsOni4ccErYclova3E7Q", "expected_output": "Expected output 1: Wl212K4OiZQAcdot0stkwkAh016kNh", "explanation": "Explanation 1: yf8...
HTB-0225
Penetration Testing Module 225
Intermediate
[ "Enumeration", "Exploitation", "Privilege Escalation" ]
[ "Objective 1: t9eLC2J75tZyZ4xGfOxU", "Objective 2: p7HWVRbn8a3C9hFgq52n", "Objective 3: LxMLehRhwtEKQqfwPXBH", "Objective 4: XVZ4UBlaOvSMBz6qf2dj", "Objective 5: zg41BNU3IsQp5XlTWwmq" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "nmap", "netcat", "sqlmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: oBgj9VR2tKpO074lZmEyYUOKKSEUJAQzWCT5RnSYxq0k9LLxGvcursqMfpsCtpPSv7vRUQRVfD4s2mOKN60pX5UVVBdcRn6kX1Ne2YXrhxSd8fEiUH38z3HWR80X7ZjnAefPuWChl3F1ViRR0xtfJs", "expected_output": "Expected output 1: pzn4h8SHUctDP993UEmLwjIDFFrMyz", "explanation": "Explanation 1: RlE...
HTB-0226
Penetration Testing Module 226
Advanced
[ "Reverse Engineering", "Exploitation", "Scripting" ]
[ "Objective 1: 6NbPSygQmReTPRVNggPx", "Objective 2: tAv4FPQPkxy0Bcjmln6w", "Objective 3: 362kpEl0v0Z03K0lrNEi", "Objective 4: R8OzQqpxUZe7s3ZVIZTg", "Objective 5: DEGnn1FAvJ7yDTobpWxG" ]
{ "os": "Windows Server 2019", "tools": [ "metasploit", "netcat", "hydra", "wireshark", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: edKe4qacEhyGqGg0JKGzrrPtXksJTTSS9uk7SYxnxGdO7vu9zj58PZ7EFFmag4HBHwK17xbarSO8GIDCjfnJaPQtsBzBxc2gdSbpgo9R0Lz4g1qVQwqk6P25GoQFwqjNP0Mr9vZARAoCxl9Kv3oFYe", "expected_output": "Expected output 1: 8Noo6TyhkrgE5cOQmRIsBb2969SRCC", "explanation": "Explanation 1: 4tW...
HTB-0227
Penetration Testing Module 227
Intermediate
[ "Enumeration", "Networking", "Privilege Escalation" ]
[ "Objective 1: 5exqLNEvrAmUYhUipUVh", "Objective 2: Mm8M9p95LLsSlg6TgLM1", "Objective 3: Hq0qaBabYwlZdcd2FiVY", "Objective 4: cJp5zJU9JMgHGUUT7PlC", "Objective 5: spctIcynB7yfEgOVi4TC" ]
{ "os": "Windows Server 2019", "tools": [ "hydra", "metasploit", "sqlmap", "john", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: HgBGyl8evlxOSQE5fSz1hpzcMEObfa3ml7C5zw41lKztmm1xbzOepEE7YVfWaHpoDcm8LiHJottPVAhKJvtt7UAHe0bZmPCxhysQrdV0q0RRuy5BzIQ60Q79Fp0PAwZltLXoxQ7AK2BG9INBdoZRvt", "expected_output": "Expected output 1: Y3IAQgV4eEb8FiepQRMNY31CU7BuNl", "explanation": "Explanation 1: daL...
HTB-0228
Penetration Testing Module 228
Intermediate
[ "Reverse Engineering", "Enumeration", "Linux" ]
[ "Objective 1: DOHiljPrbdvBXYIaJsPb", "Objective 2: y3cqv9DjriWBpdsMRgRi", "Objective 3: cczYeIyb5Rn9qso8MAD6", "Objective 4: 0cc0m7srEUpaUgIHS7Mm", "Objective 5: mtuvQ4drj7hX4hEKPP64" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "metasploit", "nmap", "nikto", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: PY10vY6s3q2wkZa8MDvCfFKj13zpAKTw1lVsAw2qa15uzGXYEwm88ImvReZFvxd9zpiGnahNr2mVB7hd623nKEb3mh4CKYwKs2YoOuX4ZVP9w0DYlZ9OHMhuZ6IefQOvCBWMFNilKZw0ZYhE35z0NC", "expected_output": "Expected output 1: dx8AAR7VxwBgCB4FnckfXaY2d4W6ND", "explanation": "Explanation 1: XIi...
HTB-0229
Penetration Testing Module 229
Intermediate
[ "Enumeration", "Linux", "Privilege Escalation" ]
[ "Objective 1: DvaqbjaEPYxM8IbCiRwJ", "Objective 2: v3EjdEaXrMs9hnaCjhro", "Objective 3: baZqQsmyjUedLuCTOS5Y", "Objective 4: bAQg2Fisr2tYJAnmRlsO", "Objective 5: abTEshJ2bStPvgOE6gBK" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "nmap", "john", "sqlmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: mtvtRQ03OJp3nEI3VQxceakkB65YQIuICxKOx0lfE0v0yYVUqsgPKMvacyixdVr6m6EduCnSh2kUzbg2tgPnpPSsXSiNZuy6bFPeEQJf5ASuMw8YpsVp2GYZzB6bwkErjvoJOuQZdjYHLXODjzcNlS", "expected_output": "Expected output 1: mTP48kMio8GLKKYGTfICoitYFKGYbI", "explanation": "Explanation 1: 9oz...
HTB-0230
Penetration Testing Module 230
Fundamental
[ "Privilege Escalation", "Windows", "Linux" ]
[ "Objective 1: 7KGsbcQvc7tJsQANvMlV", "Objective 2: nn2VVysc2IXkL6MOkWAc", "Objective 3: TypQTmmLj2MXp6qbdJZO", "Objective 4: pOP6jPG82VYBjjDXjju4", "Objective 5: pjEeGzeA33WmwOnUDZKX" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "john", "gobuster", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: IYAozAejl2yrmuJKp1fTuF6AIdvITzoR5XSf0pIMAq26NqyvRRswfSqivzlFKQEh61bMWZOXp0tYeKzMOcykDao5ZAyR6k5sL89UjyE8rB6FBqI1Brv0U7SFTyb19rqX6NZX7v1VmSxqwI5iMPYJyB", "expected_output": "Expected output 1: m7sN4ZeAGZAMMfxSXUigvwGSl6fjI4", "explanation": "Explanation 1: miD...
HTB-0231
Penetration Testing Module 231
Advanced
[ "Scripting", "Linux", "Networking" ]
[ "Objective 1: A74GBYzBoG53As0l0OBx", "Objective 2: eRL1lcvdWHvNNKmTeHTF", "Objective 3: r3RStIgsojeOp5mBddtE", "Objective 4: lpLhBqAa4Of9twTDWQ8o", "Objective 5: e9nCOStdk0TJ8orCu3hq" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "sqlmap", "metasploit", "nikto", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: jB5vvh2SVVewW2vsjtIQOklImSWFnhc4oOFzCVn3Iwx38ms6LBZjy5CGmk4g52cte2ABElW2yTOlyOVBMRKZlK8Ik3PB4s83gRTCns94awBeISB7F2ReJjIJ8R4XxmyKtbCjgJI3cyRw72ioU3ojom", "expected_output": "Expected output 1: LhwWdlMwMm3nSboxcu39Z1TDAMAlaI", "explanation": "Explanation 1: Odh...
HTB-0232
Penetration Testing Module 232
Intermediate
[ "Networking", "Linux", "Enumeration" ]
[ "Objective 1: caiWAHocHTF5tSw6oZUN", "Objective 2: DlSk70jf6X38phBETxF3", "Objective 3: wLwrOHhRQAeokYCigE7c", "Objective 4: TRkAorWynrBG8SdkRtRa", "Objective 5: KxfDQr5jaQJkHXPTuv7I" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "john", "gobuster", "burpsuite", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: FzC9glwEyWVEu4lelCzUH7r1sIfGkjwNCMp2hYs4HXjUauZ4MT8UpUJJQAh4ulV72CeDIgNpJKx8rBUASojj4H87TTmoaCapXeU8D2ZwbmgylHL6HEIJJotHMMJeg3EUreIN26JNHDYUwhXNPOGWii", "expected_output": "Expected output 1: l9PX85baLYf7pjaNOvSnpP3qA2IRh8", "explanation": "Explanation 1: 8sA...
HTB-0233
Penetration Testing Module 233
Intermediate
[ "Reverse Engineering", "Web", "Enumeration" ]
[ "Objective 1: 4acxeyEyoaXVqX9BKajQ", "Objective 2: k9pDymVC2j7GmF5PU4vp", "Objective 3: xIbfl9iL9bTZXqFvdMRX", "Objective 4: jfcXh9vqxzkHFz7iyXDz", "Objective 5: 2BhfX9rsnyJ9nfFXhr18" ]
{ "os": "Windows Server 2019", "tools": [ "nmap", "metasploit", "wireshark", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: na6uRlNBNva2E1fiKibEmYRfnhiNCYqVszi5SxtuzRl5X5VtyEwE66qatwozXaT9qJ72l50BhkFeZnbu2UKo1xpB3xIKoHzCsIWRKAgpLODXLARVf6jaPd7gcqELkYfgTsbPS3wZPPFH6iPLXpTjIO", "expected_output": "Expected output 1: Ln7wuVDtMFY8rg5kwB9B2JP6X5WLEP", "explanation": "Explanation 1: SyV...
HTB-0234
Penetration Testing Module 234
Intermediate
[ "Linux", "Web", "Enumeration" ]
[ "Objective 1: ZvpQq7KJRyLzuKnONglC", "Objective 2: bO2pHPhXDAhtI5NGKvUE", "Objective 3: RLFKP8C7Wit5xs6gDRMz", "Objective 4: GL9h2YDmqHfpk890QQad", "Objective 5: bhg4jn1lZdZlG9dxSzGS" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "nmap", "sqlmap", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: VGjCemlGdGQinRSLS9vGwnhohU65VPfMlVFLEI5wNyadtjfLrOzwquUst31qJpeoahJGET26PmsrXqgp1uqg8S8EknPaVCig28vnWopxViTtmxgHc591fXhfdZYcNEYwmyH1vJBpZJlyCP0cR42Grm", "expected_output": "Expected output 1: oyXkxhWdewV0j24USjvoXwlJd6kTMv", "explanation": "Explanation 1: M8z...
HTB-0235
Penetration Testing Module 235
Advanced
[ "Scripting", "Linux", "Enumeration" ]
[ "Objective 1: 1ttx902IgcIsAokACOwJ", "Objective 2: 8nn918Ec0FLdU5yjigXz", "Objective 3: H5NvtrqwYy5AFCFpdJ4c", "Objective 4: NaNVPppAzQPJf8YMbIYs", "Objective 5: XQ9kK2qSW8M6lWDJuNEd" ]
{ "os": "Kali Linux", "tools": [ "john", "netcat", "hydra", "nmap", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: MfJVLuFKtHkm2FXOpXPhcnZ9ySMuFTEme1VnOEirVQfo2WxnCRDBANHC9xibop3l5uaGmaK4pdK1HjOxibYtDSPdAhpNroLouOJrRjguMaIgoLpGml6k3A0UcxsGzOzz4UsxFaK0X62XueP2wB6xxC", "expected_output": "Expected output 1: twCOxkFgFLSwSc6XiT5pf8nCawU6ps", "explanation": "Explanation 1: 2gh...
HTB-0236
Penetration Testing Module 236
Fundamental
[ "Scripting", "Exploitation", "Web" ]
[ "Objective 1: CJEhj9IeTlVXi8fB7jBy", "Objective 2: pSR7CLg3Ow4SqTYq68q1", "Objective 3: J4FleR1SHg7zQ0kXOy1s", "Objective 4: 1z3NrQAquUtENWENxLuX", "Objective 5: krfwMkuWL9G7PrxLOe5m" ]
{ "os": "Windows Server 2019", "tools": [ "metasploit", "netcat", "nikto", "burpsuite", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: bImOFHVNqolOTmCaot6n1G8lNrX6BTGMwv2z2i0trALjxCK4CrX8r4ovuokCtNcuzs3MyRZ4ryazYXVitiVbb5V0R1gUv4XaoLnygZu8sorG5L7mgsSz0CdXQpR4aTKScKF0gjPKL5yJKYWN24Mwx7", "expected_output": "Expected output 1: jH0YkBOBTjzsP0dov8908Cel3CdhZg", "explanation": "Explanation 1: iN0...
HTB-0237
Penetration Testing Module 237
Intermediate
[ "Enumeration", "Linux", "Privilege Escalation" ]
[ "Objective 1: SfngyfauWsS3dhBnp0Ko", "Objective 2: eMRz3FQvke0SMJPC67LK", "Objective 3: NeQDPWtWw6kLsnE3UbH8", "Objective 4: ZH9mIsgoZtpnku9myFfS", "Objective 5: EGrNVoB1YwbR0YE34Y8N" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "nikto", "metasploit", "burpsuite", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: XlvvdCdF20z1XtTSCptWg9I3qcXvcFDjIdMxJ8ZkSS0REGoIwNHCF1ytMEEGI5Rv1aQArfkU0RYrq3AKKlwK6sCSdDjrtgdqxG2iECgtQ5IeHBNdLAxCsEs8a5geT6bY9fpSQKC1fVLIu7zs8iYnDR", "expected_output": "Expected output 1: hri6yjCIw84bp2noEIYLMFlwXzQj8t", "explanation": "Explanation 1: O7H...
HTB-0238
Penetration Testing Module 238
Advanced
[ "Scripting", "Exploitation", "Enumeration" ]
[ "Objective 1: 1DMlm8vrkAdZGMkph0nG", "Objective 2: kQcWJD3eW3iiLbfOo2QL", "Objective 3: odz3AzdeVc7ov9Y4VPtZ", "Objective 4: rmoWQEfJ5JrmCbMcox01", "Objective 5: KmEF2cuEpGOeGfJEHBxR" ]
{ "os": "Kali Linux", "tools": [ "nikto", "netcat", "metasploit", "nmap", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: xqkVce3qpSRDVNd1uaNTLTPPeAQNy5GWlal9mg5R8anr6zwfPh4H8wsRSphZSh5HRIEKl0Ndh1Kqow1D5rqnO93z2mB3rz7IMrrqS2keb6VC1Clu7vEKU8H4yPG3qAMJXDyHEc8kO2Xnw63n0nl3cq", "expected_output": "Expected output 1: 645nOc2Wlw2s7mGeIaR4Qx7JUWBQkq", "explanation": "Explanation 1: gom...
HTB-0239
Penetration Testing Module 239
Advanced
[ "Privilege Escalation", "Reverse Engineering", "Linux" ]
[ "Objective 1: 2JXlRlVFmHOmhe651qtd", "Objective 2: IjIwL3Y4hux8A9K1xmeI", "Objective 3: qkoyj9x7Lyes5A9mbGg0", "Objective 4: TdMhFIWh5gmchCnSAXUX", "Objective 5: iunfy7DcZrbVPDzxeySc" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "nmap", "nikto", "hydra", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: RIGyfaFVQ2dyzCYymrnUaMscDscKmF6LYk8PDkjfaHnrsAcs8T2K7t4veh89sOnooqIISU8Uo8fElXeKXaIBxIoDqHrgdRNaxqnBE7zzRuJrPYZ6ZUBYvkk6TwAdS9zvoaxvUYSZeXeQhWp2FN30xu", "expected_output": "Expected output 1: f5MTBs4aIgqVtBVlr5hnJZqfYwgRBL", "explanation": "Explanation 1: vw4...
HTB-0240
Penetration Testing Module 240
Intermediate
[ "Reverse Engineering", "Linux", "Privilege Escalation" ]
[ "Objective 1: YDKk4ORtBV4paWKA6loj", "Objective 2: l5wKbGhD42oWdFhcsef1", "Objective 3: VDj9ruSquyzQXedz7IWd", "Objective 4: LF6jxd85iKZ5lZ41XmYs", "Objective 5: 31RFkla9GBYp54NqxJ5b" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "john", "wireshark", "burpsuite", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: GbI4kxu8redY6vmgzzWWfMW6Vqs9Ri5oNODJmtoYVeWXwL33fYENcB8rd0hNCcWYBBokIbwx6daYXskW8zBUqukRcuE25XFmdgb3vAdpE2O6mYwhaagZhTUqNRpTkSzipdq618rCCE2RH9JNkGwYdX", "expected_output": "Expected output 1: 8pPeIU1mENuo8XGqYQiAV4YvGJwJZa", "explanation": "Explanation 1: rAB...
HTB-0241
Penetration Testing Module 241
Fundamental
[ "Windows", "Linux", "Reverse Engineering" ]
[ "Objective 1: O4JI8WaQTVrHmOAqEho9", "Objective 2: Fp7vtp1bAi2NHDiYnYWP", "Objective 3: QqJwmBWHj9EuClwtaoDd", "Objective 4: 3JZYSiozAh6aGd1ejvpI", "Objective 5: YVor0udwjiYQbA44YNRa" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "john", "sqlmap", "hydra", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: V5WFLSS54XtldTGYPozbX2if8jGeAouLaWoTdkioYRJcBFmL2DUSpynvGJ8h19uN360PXyOLK2YVUGKyuRRM3GcrvAQLWy8I2umYd9blidnwQoa3Xn4I9BmHKRkv58igFbFi8fz60t6fPiNB9x3bBH", "expected_output": "Expected output 1: otweBAWmU2VnCGB159WNXbS63kzPxm", "explanation": "Explanation 1: jeg...
HTB-0242
Penetration Testing Module 242
Fundamental
[ "Scripting", "Exploitation", "Web" ]
[ "Objective 1: ZKGcy7OlW3CWc5aRl56U", "Objective 2: vRgWtX8qbpToP6BZ76aR", "Objective 3: fTbcKEEfu0kjVdOfKuYB", "Objective 4: HlEsA8vO3jUFeOgHRRto", "Objective 5: dqC7E3Xd7lHyD4JqoLcd" ]
{ "os": "Windows Server 2019", "tools": [ "sqlmap", "metasploit", "burpsuite", "hydra", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: 46mZJRcdrfo0Tcpqo8wLoOHVuU1o1o88iJnHPuqnByuyc4JYiZBVFEeOneKg22QkerXnaxhdrYmeVzq1G4vWKqDyYMkPnDYBKswl9UqBMUzJce6jnmKG6KpEkYORn6yGcz8vKCFQLmuqmAMY366KC2", "expected_output": "Expected output 1: 772QR9UdmlK0nXljnRDInor1rRe5IH", "explanation": "Explanation 1: 2dv...
HTB-0243
Penetration Testing Module 243
Fundamental
[ "Networking", "Privilege Escalation", "Enumeration" ]
[ "Objective 1: CqIxn4jKXb8qP275XMnF", "Objective 2: ONV7eHxfoXSL7yOCRsYf", "Objective 3: Alv3x9a2DkNMQzbFdqkw", "Objective 4: MACwFnmYaB1DwCAHyjpJ", "Objective 5: QG439O8vlldfyfRinPih" ]
{ "os": "Kali Linux", "tools": [ "hydra", "wireshark", "burpsuite", "metasploit", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: UF8QOHqFewY0Q5vQE6RLnTFOO2UdBkezrtykGYkxDLoZoClLSsiJjvRi1pDj3Lx1Uq9XIonupoBbsBcFU5fyZvV9TwPV0eaDOuAElkxTrVzaRZDKUVyhG6P3HFf4Q6zRtYLGwRV5Rd7sieA7M1PYQw", "expected_output": "Expected output 1: TgRvR3nW7o1x8usTGjqFw4Sck4PeAj", "explanation": "Explanation 1: CRn...
HTB-0244
Penetration Testing Module 244
Fundamental
[ "Exploitation", "Linux", "Reverse Engineering" ]
[ "Objective 1: GlFl0p410xT5AF1UaAmZ", "Objective 2: ykiomqNCAxHudvDsNGgL", "Objective 3: dPBei7RrHaiVTG5PGqsE", "Objective 4: UVHXxIWQMTlLWgNk8vgY", "Objective 5: x1TcnUSpGFoVDQQEpnN5" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "nikto", "sqlmap", "john", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: cWYx0ZNcg19OWxcVWjQQZk4fpGFCIRtezJj4ckwoi7r9pIpNnYGGkMGnAc3RlBuxcf3TWhlwGvybYaXFrbAqwrOMU3i3vXjgaGj8RQdfo73UTaiqS9XEMarlGlzFsMjGUZS0xnCwViUdBsnAICxowm", "expected_output": "Expected output 1: ivb40Emp7mcaqsf2axYONk5CLbkCCv", "explanation": "Explanation 1: xsN...
HTB-0245
Penetration Testing Module 245
Intermediate
[ "Enumeration", "Exploitation", "Reverse Engineering" ]
[ "Objective 1: DVXnHmMRvkDEhYGkHuZa", "Objective 2: FWEnKD4TU7ZxVA7tvOmE", "Objective 3: y73mRbgfDHAebAMShtrV", "Objective 4: jgnPS0Nbc1iY5CyZBHWR", "Objective 5: o8XvIpGKUmbEnIyZ8Kvi" ]
{ "os": "Ubuntu 20.04", "tools": [ "hydra", "wireshark", "john", "metasploit", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: vAZtn2kjj1L2JS0nzORH5tNSQobyHe7ZNokN3AuBreA3TSLKh8ot91fOEZbHm4kzJUycXDT6YueUzh1A0RO57ruFqAg0dIsTY6YaEbECb5jV1s76Nhmp5mfOnm17Hppv8CDKPRuAfNisBrJjFny12h", "expected_output": "Expected output 1: 6NbCL6eTlwEStgHuQftgOqf7tkprAL", "explanation": "Explanation 1: nhV...
HTB-0246
Penetration Testing Module 246
Intermediate
[ "Privilege Escalation", "Web", "Linux" ]
[ "Objective 1: qooXWt6yBPNgj6xILCxh", "Objective 2: N7tfNWJKrc8HvD3qPYQg", "Objective 3: ZSnAA1NUhoL0bf65K7IO", "Objective 4: 5tjX3EY4E9feeilkidL6", "Objective 5: e2OkJ3pHk95F81DaflE4" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "sqlmap", "wireshark", "nmap", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: EMzO8BIpVXT1h2powMY4fG3siEeBftB3rYQCKGgu1tOSnh3QgPtNCrtH4DS79j8xIn1sxixUwMxOkXZrWvtyZPs8QwRhwfdlG8SLwj1ysVo5Px5eQ1gTHUdg4MROq3I7iwqstTerJIk2IJWZCy4QBh", "expected_output": "Expected output 1: xrbj2Lq0CBQyMplTBHMSXnnlzaqdF5", "explanation": "Explanation 1: Ek7...
HTB-0247
Penetration Testing Module 247
Intermediate
[ "Exploitation", "Windows", "Scripting" ]
[ "Objective 1: RAxhQjHDUzTP2rahD4xk", "Objective 2: Lzg1Gf9m0RMtKa2ZO9kA", "Objective 3: wo0isKEYEDGajWZChAlB", "Objective 4: 86Jy5dzA8QMCRqV1waiD", "Objective 5: Qg5lvvHASyrLA3igeijb" ]
{ "os": "Kali Linux", "tools": [ "netcat", "hydra", "metasploit", "nmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: ShaQVwOIOMylj6ktguZZuPTsjPUY4BjcEf3UZH5iBU8DWkZsarkn6zoZbkivc9FQeRgsarlfPnv1bdgh79Q71Bp94Wp3I5xShjeifqVFn3Lu6ou2rqn06rF5TChjqHhYEYVXoCgUznsPjZeyTKqmeL", "expected_output": "Expected output 1: 1twDPPRwkhCtRF1VYQGT7ZlVuGgjRI", "explanation": "Explanation 1: wiL...
HTB-0248
Penetration Testing Module 248
Fundamental
[ "Enumeration", "Web", "Reverse Engineering" ]
[ "Objective 1: Nex0o9Df156GkX4fnKvG", "Objective 2: U8kgKBCjg1uuicNyky9K", "Objective 3: bbj3pbIh7t11AfpF0aFK", "Objective 4: 2Es3GrEvYdtHYcaObUQX", "Objective 5: UnMOwUsuxtZjSXMOkGGN" ]
{ "os": "Ubuntu 20.04", "tools": [ "netcat", "hydra", "wireshark", "metasploit", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: kJrN2ICdeO2Mcc2yYYx9EQjz4dBpG1CMhKfRtafnS6tEOs46Dw0xlJEVHK2bs22lHc2nZMfdyXEmtCo2fxLuWKwWaD3zyTjAWYiXlJZkekznQrNF0EABLkFBKYhLa5cSnPIlrUnh0cAZwfTPR3l6FJ", "expected_output": "Expected output 1: EzlFOUJaONThP8r6QioZd24dcXrYEq", "explanation": "Explanation 1: A2t...
HTB-0249
Penetration Testing Module 249
Intermediate
[ "Enumeration", "Reverse Engineering", "Windows" ]
[ "Objective 1: xsotParlL6Q3SFOQTs6f", "Objective 2: 21PgZKYM5cgvL5BJqdC2", "Objective 3: ZnasiHn2D9krVgdp3Q5b", "Objective 4: XRDddWmSUr9lBMWkDhNt", "Objective 5: 3vKU5FEzrMoFkTctYdaC" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "nmap", "nikto", "gobuster", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: c3RuH4t2DeWMwHMOq3wIYiYCCHCCvk3PgBdIK5XQiH2oiEyxCaM6y8ZDUtT4XX9DSzTXHk3U9ErpYIgygJMhPyAqaUyiEGTyOoRBebbUoPamtsiSLb5AhkUJNG96DOoamUhaqjxzE0WM299MhzsSOD", "expected_output": "Expected output 1: iSXRekczvzZjz8kMFSYHP2VE7BaJzH", "explanation": "Explanation 1: cqW...
HTB-0250
Penetration Testing Module 250
Fundamental
[ "Scripting", "Web", "Reverse Engineering" ]
[ "Objective 1: SETqRdeNJeDz9VXVOyOA", "Objective 2: w2eCmmD3yT7oFfwudx8F", "Objective 3: N4h5AP5xL0N3FfobF7UK", "Objective 4: RSACBywTtRCLWsrZy0oH", "Objective 5: mQjDSDbBSGdp6KOOcDGT" ]
{ "os": "Kali Linux", "tools": [ "nikto", "john", "nmap", "hydra", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: ivtH3EWpFz30TdwYo2TKDcNr4gTgMu24ubktE9lIbTxXQ9PB1XXAYpN87HVri1j36lEJAamywfcVY6qARmfuJhHGVuB1c02f7gfH9PKRR95WdwLfqC10ZfuzATtt1HHYjmcFt885sniyplwaZmkBzp", "expected_output": "Expected output 1: 2jiWHcNSYePIcnWcahG4AemarmgAwJ", "explanation": "Explanation 1: d8y...
HTB-0251
Penetration Testing Module 251
Intermediate
[ "Exploitation", "Networking", "Linux" ]
[ "Objective 1: rmeGiEayTa778Y3Xk3zL", "Objective 2: ZefuiLJiJY2tbSoc7ApA", "Objective 3: zLwpdUNUweghgS7rDX0g", "Objective 4: yoPIBu2zZozTO9JGbqUu", "Objective 5: 1JNHWUOSnNFyQ4HFa2BZ" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "wireshark", "netcat", "hydra", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: 91Lxv3kM62ibH30IVfTX7SQmauhQwszeoKMu3rupGPSbgombSVZA2m6cDu8XBHNkaVn3j3BB4r2uEPnpwnWxbtc9WyBhj2y77Eju6kqxPp6NDTnc5ga0qGYqwrpC20vVDbzOnYT7YhWIJKkB2LazXq", "expected_output": "Expected output 1: 8KlWdGkrOqAAYegclM0pyiyWvQNO3c", "explanation": "Explanation 1: SeY...
HTB-0252
Penetration Testing Module 252
Intermediate
[ "Exploitation", "Networking", "Privilege Escalation" ]
[ "Objective 1: BYQbFwajVuKxSasQ8x0f", "Objective 2: uZntHy2YfnyWHK01mnpN", "Objective 3: jZ50FtPiwmrnbNUN1mid", "Objective 4: rH6bzCWvlRv3tAw8dk0G", "Objective 5: tVmRlhSONZpJPl3iVNg2" ]
{ "os": "Kali Linux", "tools": [ "nmap", "wireshark", "gobuster", "hydra", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: EC2tnhaB2QTjQEy4q3yu2gfb9vmh16MOnuXLXPlQ9SAwGvNjRE24aMYqJdpjHW1A3UWiceGNIuWh1mAL9jQ0UZ8m913Aqh9U26WApCdYNUlPjWUtYrWItKzzXWVka1WraVGYfvMshXTWCsFaUNNDkr", "expected_output": "Expected output 1: eb8onLFUsdTgDGypzTw4wRJ8ZeeEiy", "explanation": "Explanation 1: Il2...
HTB-0253
Penetration Testing Module 253
Advanced
[ "Enumeration", "Scripting", "Reverse Engineering" ]
[ "Objective 1: mQbjai3STOPSL7fDHrhG", "Objective 2: rnq4WDGeMp2V8f3U6KzK", "Objective 3: OGLKdIhd27s2qdFy2ib7", "Objective 4: Cmj14RFEfjtJplwQc0ih", "Objective 5: 9WOCoQjxaAeopPN7Q0LK" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "john", "nikto", "nmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: lLmKwVWUyv1g4azFrU6fAM9VAwBg5fjnW7F6SM9aLv6DPQlAqlYsKXNisVQQCIyTaaQuTBQxrIsGyGrdNh6MIO6rXvlGBCW0KMKBxozhe89BXjfM4nCIggdYv1J4oJdYUfje6tHwcCpYEoEap7KmAa", "expected_output": "Expected output 1: vofMXW0JcYK0sodkR8qP44honiJB0Y", "explanation": "Explanation 1: 6RG...
HTB-0254
Penetration Testing Module 254
Intermediate
[ "Web", "Exploitation", "Windows" ]
[ "Objective 1: bDocRBVQhUOmrgMW7SWg", "Objective 2: nvtQpcxoN08F5xu5xXHS", "Objective 3: 3hZYmcYcjI7hrnaanE9G", "Objective 4: Q65I510CqrV19rZJzBK7", "Objective 5: SHbRfoo8AC5yVv3nDWjW" ]
{ "os": "Kali Linux", "tools": [ "netcat", "hydra", "nikto", "sqlmap", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: IYm0xF6OqrF2DrULI7chlYpAmpNnbU8AMMgiV2JfAANZgkQWN1ZgNrW9tHX6bHnKOrQMs7yWog8SXfAyB0OfH4GdtCr3ZzWTC1ZmgMZkUaTUTpOTLxQI37CEKURibFK0sNIggszLIhjJsqw8uqqNRJ", "expected_output": "Expected output 1: we9T6bdwGClCUbISPcZ7uF9MRq7C6I", "explanation": "Explanation 1: raK...
HTB-0255
Penetration Testing Module 255
Fundamental
[ "Enumeration", "Privilege Escalation", "Scripting" ]
[ "Objective 1: xkFUYfoYe7DJwd4c6zPj", "Objective 2: iaJl0DXvsiWEQJ0sxXlK", "Objective 3: k8UNyxRvGT0n6uwn3ke2", "Objective 4: vwtAaQ6GpG80AJQG8CI2", "Objective 5: nFo4KWw9o5FXWMfUlMUu" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "metasploit", "burpsuite", "wireshark", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: iTzAGpIH966GFETIZMhX5KhlPwrWKjbv04z3TpLRrmHiFaqQn74W2PPI35jJ5MahWAkm9hEgngYo6feGPqXYobXO44wna6NXrTjcTn58FW4ejTPrMLaRjGY56pnkLKh6ADrkPDM454XMTtBsNofU2C", "expected_output": "Expected output 1: MtN8v3lxrZmM99ViXUwRWkLWv0C2Vc", "explanation": "Explanation 1: JI5...
HTB-0256
Penetration Testing Module 256
Intermediate
[ "Reverse Engineering", "Exploitation", "Networking" ]
[ "Objective 1: YY9UNh9zSFMpirAYg8on", "Objective 2: 8FsVgTH5YsYrBHpg4j3j", "Objective 3: 3u58PhTDLtnwUUQ4vLet", "Objective 4: mlfgKpjvCL3AaLWxON3v", "Objective 5: cJhAmwlbVNQwf3ZdGzve" ]
{ "os": "Windows Server 2019", "tools": [ "hydra", "burpsuite", "metasploit", "wireshark", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: pFktjubjAlxJIoNneQys1gbD4HUmjGpK6kVRvkkSFvZQp3nKh28gUewVJlI5iCP5iPUHmpnRFchGr26CEJnArSragnBKfVVc3PZNM7yzs8nbZ64mnyrRct2jc4g7iztMEUM4htC8u8QBOMVpDCoAiR", "expected_output": "Expected output 1: x0piqTPKwsPvmO7i538kcYTq2jfdxS", "explanation": "Explanation 1: F8p...
HTB-0257
Penetration Testing Module 257
Intermediate
[ "Scripting", "Exploitation", "Reverse Engineering" ]
[ "Objective 1: da7nhcJWsl9xs6domQuO", "Objective 2: D0OwJOLCZwwMeR3SYa6s", "Objective 3: 4I8eB7NiqAIOAkV4CGug", "Objective 4: bBkC37aqAVvuPqUKsvTM", "Objective 5: 41sroc2smZa4yXebnM8a" ]
{ "os": "Kali Linux", "tools": [ "john", "nmap", "metasploit", "wireshark", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: By8yA3Agt9BfiJxWo2RfQbpO0zOXGehF04PN8ivhPVvADswFH3FEffyODcmevkyxKQeT9PnUjfTq2DAJ4m0rMWW6zRu0qPk8yB0ATxLFsauQ9gAiAThav0y7zLShW5ia8nMkMRVnNRTAtrbLpi2syv", "expected_output": "Expected output 1: rpmyUZPOlgwlGt8ZoBlTYX6wCezPa1", "explanation": "Explanation 1: BZn...
HTB-0258
Penetration Testing Module 258
Intermediate
[ "Web", "Linux", "Reverse Engineering" ]
[ "Objective 1: nwezRKrOlwOeLFhroxHP", "Objective 2: 9SOKyDrohiddLLZ6Rucz", "Objective 3: IynD7JgcV0r6zm0bZKfa", "Objective 4: CQXIVnm0y4IJyUOWvH7U", "Objective 5: WPwQ4fJADmJxsRqfhlDH" ]
{ "os": "Ubuntu 20.04", "tools": [ "sqlmap", "burpsuite", "john", "nmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: E3G2a1fvcJopQL1QOtQVZik1eT9DOh5kG3YdYNaA8JxF8JCCP0ZOU2anFW8E0Jkyt6iveQivORTWajFzPfRcXiyJRwkgAqzYDGfawgH0Ye1aQEe6HalazqZ16hcqiMISfS0A9tQESH2RXE4P37SSb8", "expected_output": "Expected output 1: t0DEzzD7rcspKBnENiZVa8m8o97C0q", "explanation": "Explanation 1: hkK...
HTB-0259
Penetration Testing Module 259
Fundamental
[ "Web", "Privilege Escalation", "Reverse Engineering" ]
[ "Objective 1: 9UhfVNrrxEr3stINujx6", "Objective 2: 3Krl01BdAfR8TyOvY4Lb", "Objective 3: SeiL7fubHgG87QXu8H29", "Objective 4: 0p1j1c8aCZS1I2UU8p5T", "Objective 5: Gpgyg9dTm9yvE4C5YI08" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "nmap", "nikto", "gobuster", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: JudHlvpfy89yhqjHKB5Lejjx0YnyocBcknm9gJKCzKL9w8p6mwTWYc6MwRCuXtkf77gEeciAVCCXJvYso6Ib9NhDiJrW1IpZn5nq8LdIQ0bte3vUc5GJBXIRsHJyX9hxAeIYA42lcrlqBPllSrGsPo", "expected_output": "Expected output 1: 05upY39pjaNTRT4OqQoMHlJmrOTIgT", "explanation": "Explanation 1: FL8...
HTB-0260
Penetration Testing Module 260
Intermediate
[ "Exploitation", "Web", "Reverse Engineering" ]
[ "Objective 1: IMQwkHnFHwl7V6wUokYP", "Objective 2: vxhFcWYqRVcRW7gQwGtm", "Objective 3: 7WOLgEMD9rTa6W9M9JWl", "Objective 4: xdYKF84djZtVH136Vpat", "Objective 5: GRpwSkPfNxxinb6VgYKY" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "hydra", "gobuster", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: 4SNlbEAeziW5XEapG2KXgufbFlIiatqAO5Vkxj5OwJ8kGjnXec8dfHKcQwl2Fg5Hb6rv5a5hnXmgZZAVqWHrIWKiYeQ8TmCiaiJUOQLJBpLjCHWjcmcb0NXPmFDHHmQOIAHyiOxK0qMr1EFHMERrAg", "expected_output": "Expected output 1: XqMy2dUm2FnR91Ivg0H94RsiUcqPol", "explanation": "Explanation 1: Gmy...
HTB-0261
Penetration Testing Module 261
Fundamental
[ "Exploitation", "Reverse Engineering", "Linux" ]
[ "Objective 1: pwykwFXhHRFEthjL4Kei", "Objective 2: biqTB0YPZZPn0aqbgyOU", "Objective 3: OfdmRzB6qtD2WEnLFw4H", "Objective 4: swQVsi75JXVU8N4pXe4Q", "Objective 5: ZZMTHHPU8aK4ZYPElmUB" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "nikto", "netcat", "john", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: Y0l9JvkzrK1bT1yqb1Q4L3EgGmEunyuDfrwx0jKEJxUD6EA4AGJ14rEeFoNKWRuCk4q9OiUcryCWVkrw83qrqfgHewk1ps99ROWcUGDhe0edi7JFpjY5CSKYpZtrs2nvF82jpTilK6zrZPwidyUoqH", "expected_output": "Expected output 1: Z8DS98OEtxlSqsiwwdjeJccJOXKMUV", "explanation": "Explanation 1: 1EK...
HTB-0262
Penetration Testing Module 262
Intermediate
[ "Enumeration", "Scripting", "Windows" ]
[ "Objective 1: ao39c4wNLO1laLlNmda7", "Objective 2: 7h08KEdiKE9M3NCuhFtD", "Objective 3: FZP5wUe0ulGsQn8j6P5V", "Objective 4: IKpJWIxKScIXyQGbzYBl", "Objective 5: f2Cs260hXwPavj6xrIAk" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "nmap", "gobuster", "hydra", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: miHTUO8d9XSNm9NNavxMCCyRJ7RXMWgD2dij24k4Br9J1U3Sa0Va6wChTCGPY8yYx9qRKUOVqAHwxGDvq6PQDmX2KaBybC4XIsgRq1ZxcMC2ht7wqrieNSv3McujrWuvbMOLyagosriBzRbYuTia1A", "expected_output": "Expected output 1: H3aO6IgHum9EzN2tXLqXjADoRkquju", "explanation": "Explanation 1: xWr...
HTB-0263
Penetration Testing Module 263
Intermediate
[ "Reverse Engineering", "Linux", "Privilege Escalation" ]
[ "Objective 1: tOQXpWcW1MGqH5oiqmGR", "Objective 2: sKH4n3yG6kBcfwCuT4up", "Objective 3: oAWnFFmE5SJMFzLSgdE8", "Objective 4: s0P1FwPipxCCMNWEicIT", "Objective 5: oCyDnNsxd60KHvX47DZA" ]
{ "os": "Kali Linux", "tools": [ "john", "metasploit", "sqlmap", "hydra", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: kYAwC4QEFdOmCd3GEibpEhZ3saduu0IguBfwVUeXZPxlk4w7yeKfnBkyQJH2oMdiBg73AztKavC0AnpfPpdgMmywcHb4OOPcYHuwqrcBTwL5qEpQmdh7ftYwdCxS2GxkxIZRaPnDYhbWOII4CHo5kU", "expected_output": "Expected output 1: ognOv5ENilkPG15NwJzlE9ujxhYlWW", "explanation": "Explanation 1: w84...
HTB-0264
Penetration Testing Module 264
Advanced
[ "Web", "Linux", "Exploitation" ]
[ "Objective 1: wKwHlf5k0l6fktIFJg4S", "Objective 2: q7yJcBf34tgONItegUSn", "Objective 3: Z51HCDMAl9edlLHAnkWJ", "Objective 4: qWt0F9re7qWCK3BAhwcx", "Objective 5: bhpxqs2LKXfGbvZ4vsby" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "wireshark", "burpsuite", "netcat", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: EUBWzbetFQX2FzISOFssAaRWoTIG3TtzMow7tI226NlxFKnuI0XCzmYWJ4CqjH5XAXl2qSj7cHd0wDixg2zSmtrro2VhU35RWs306GKmOVKmU2a1oX4zoMD8DFQVnkxCKljYrC1OhgGkDOcGBOrLiZ", "expected_output": "Expected output 1: 6QwPV1xSSN1NNiXjVjAEqP6mdFRgBt", "explanation": "Explanation 1: BWY...
HTB-0265
Penetration Testing Module 265
Intermediate
[ "Privilege Escalation", "Networking", "Reverse Engineering" ]
[ "Objective 1: Wlkyp5mgQMPIuvYztM5g", "Objective 2: jr9JZSitVFTTqyOrWW1k", "Objective 3: eC7Fn9Jo5UtVrUeRLP6r", "Objective 4: 38Js6fNUrfl5pU3g5iyK", "Objective 5: nxJVVxUUBZe0mUMPhlXN" ]
{ "os": "Windows Server 2019", "tools": [ "sqlmap", "burpsuite", "wireshark", "gobuster", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: JQrZuzrnLPyaAcVJkLcwAGTP9RtEnoYJuSbkLV493TBnFhemr5M06VqhytdyyzHMLDmvieUiaXfiwo6PfxtY6P3HhcNf2W6bAuNtavWHnHG7xhFlNceu45xzqMVY5v5rEY49oGrcDQXMceicZ5UqU6", "expected_output": "Expected output 1: QJye2aic1JLZaGiwHuVvS0PjYb0nXA", "explanation": "Explanation 1: vK5...
HTB-0266
Penetration Testing Module 266
Advanced
[ "Enumeration", "Scripting", "Reverse Engineering" ]
[ "Objective 1: 5TngQp7dPHkywhJs2H8C", "Objective 2: vcWc6NMOBmf8XqVBcq8K", "Objective 3: XKFvex3IB9SfBjis5spE", "Objective 4: RWpZZsSMmiMmg2Zs4Nh7", "Objective 5: kQo0pe37Ih4i71i5h9cu" ]
{ "os": "Kali Linux", "tools": [ "hydra", "burpsuite", "netcat", "nikto", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: ZKuHMkOCHToDp9s91OdfJ3HP4cBPqO08vhEyb5y1aB1v9fNBsVooCToMggcdbl1dOnhmZ418QFLJEIv7jwREe57LvBrpvQssFejTmdoHbQzFMIyHzQIDPCAoMncgYaCBXIpgAx5KCAFUjGXcaGRgtL", "expected_output": "Expected output 1: QxbNh7jHbZiDH7AAeLWBBgYAy0e5eS", "explanation": "Explanation 1: Zq3...
HTB-0267
Penetration Testing Module 267
Intermediate
[ "Reverse Engineering", "Exploitation", "Linux" ]
[ "Objective 1: Pq91VlgTttsa2l7C5OjN", "Objective 2: 6KFesKfjewPh6f86OqpV", "Objective 3: RzHSAJD7RHGYpaddC0Mw", "Objective 4: YPpu462Aw0q9W0sB0aEz", "Objective 5: cU7OJ3Rjo8pOKnA8xBX0" ]
{ "os": "Windows Server 2019", "tools": [ "metasploit", "sqlmap", "gobuster", "burpsuite", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: P0uRmzAWJTE3NAdBcLltDM0SaReossF64zcKyA733h0YdaoZPYnQKyreyx72QfKFTvzzdpZywI7i9q4MDCY6wnSCeECJgyp26w7dwz3Wsnxht0XDJYOt9eonfrsmKCQtp1nBuGRc4TMEuRiZhfhLwX", "expected_output": "Expected output 1: TfEvYVUmlMClwUknZdchLTJGOprJpL", "explanation": "Explanation 1: GVq...
HTB-0268
Penetration Testing Module 268
Advanced
[ "Enumeration", "Windows", "Web" ]
[ "Objective 1: vvoijDRhFkUS1tlSlpDt", "Objective 2: jujMP8j5X1ym6mTSjvhR", "Objective 3: KYAepwCM5NUHSSP3gKMM", "Objective 4: TiWdZHMbcRJmmm9fzei9", "Objective 5: qrvnA357VR5XOkE1oGCA" ]
{ "os": "Windows Server 2019", "tools": [ "john", "burpsuite", "gobuster", "sqlmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: Q6gw6jqFkGk9evtXB6SUMQnH8B8bHXq4QGWUcVmNv3cLCheUJRDD5stLfyHa0oh1EGBQGVWm4hTL20MhiqpjnMLeVN2tyMRrFN7lFvIl9sBGJNu2KjyAazVnVarSHMm1EuDaob3gBIqKHVQGvfqBG2", "expected_output": "Expected output 1: 5UPNUaxpN6klYRTY6Dm3iAWZi81j3r", "explanation": "Explanation 1: IRb...
HTB-0269
Penetration Testing Module 269
Fundamental
[ "Scripting", "Enumeration", "Privilege Escalation" ]
[ "Objective 1: uoRrfUQGCRRJlSvvhAvy", "Objective 2: 73Sum0YK9NH2Ou94msVD", "Objective 3: 0kXLBYDM7TpwxCyIWZ5h", "Objective 4: DNMEpmhiBvM5dVIGV0gD", "Objective 5: ioaD7J3xktJvTA8XZLWv" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "netcat", "nmap", "wireshark", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: WZdTN3QpK3VTMUccfRvQxw3nUONYfmrhIloKbdappSGhfRv6Xw0uPUcwgZm589MMz4DTXZeAHx75fdGWxWPO6qgWtlJv11tff3QrgcyiVISfvLQ8mLoR504a6vx9Rl3ueE9dAxWJbVONdGcWlHtSRn", "expected_output": "Expected output 1: nUHn7wTk6NZxQf5XbkZ8e04f1DaArg", "explanation": "Explanation 1: X2l...
HTB-0270
Penetration Testing Module 270
Advanced
[ "Web", "Enumeration", "Networking" ]
[ "Objective 1: 7S2HXvaOKImszmx57SmU", "Objective 2: Ucb5mRP56LcuvuUkcVpo", "Objective 3: wRLePJ3uXfIUdV0UdJr4", "Objective 4: obtaLWXAaD6coNIaq2Um", "Objective 5: JrmXNybJjMywHYTey6G8" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "metasploit", "wireshark", "sqlmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: 0RLw5OmPslHg5Os83owuiscFdBLb7DARStOVKkfkJJwQaNNEBNzGVo2HHG1kc1z7kHCwpf2tvUPyRY1iDYIbx8JPfL2oDoSTtpHaa2AmpChheXq6pkrXqpuERaq8t1OCxnEsn9vsU9m4LaDlnxrGiW", "expected_output": "Expected output 1: aKMcoBoCJt6uBOC5JS539aFJEOx8K7", "explanation": "Explanation 1: Qxz...
HTB-0271
Penetration Testing Module 271
Fundamental
[ "Privilege Escalation", "Scripting", "Networking" ]
[ "Objective 1: cRSR2wCXMn8McfOs5LHX", "Objective 2: i24kxulLvNFj0CmlxxHi", "Objective 3: P9wf8oKJTdUJNs8hdnHw", "Objective 4: j9mkOkNLIQnCgnEKOclT", "Objective 5: PU3b8KO7HUN0nHlFDhgt" ]
{ "os": "Windows Server 2019", "tools": [ "metasploit", "john", "wireshark", "nikto", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: Z8L4xBgQtvzPMmxW0tQkcJr75BzpzcfV4JFGy7PbEfO6cfIPvYdYfxnZUUiGXfECX650KkxpaOq0b7DhFfysRvezghobRh80sEgK0njgyPGTcIvFq9ArysxvUm2JLenJoNDLfB4gv6nl1gixbNbMF6", "expected_output": "Expected output 1: RTRe4KnJamsLmbnpI5sx5xNUlUT0IK", "explanation": "Explanation 1: aXX...
HTB-0272
Penetration Testing Module 272
Fundamental
[ "Scripting", "Linux", "Reverse Engineering" ]
[ "Objective 1: FLIMfuHH6mpG6B71V6DB", "Objective 2: EtsW0D82aLaLbqO4Wlq1", "Objective 3: QNZMkexKv5QgKraShRTV", "Objective 4: LzRUSmZdl4i6yT2miQ6X", "Objective 5: lPSNMqRtgeYnC42thUe3" ]
{ "os": "Windows Server 2019", "tools": [ "john", "burpsuite", "netcat", "metasploit", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: BFuNtuRGR02jtlTNBXN46FQEKdW1pX0f1pyF0lpEVzQlWuTVrnQCTIEuBJ6USxZxtmLAGaBCdkIG6lwGhQVucuBOihKRZ0gyIQEwLzP53Gu65URamZogG9JIXsQYEExsg4evVBT5II9aYj1lJggINB", "expected_output": "Expected output 1: VbH7U6SGXZMslQ7zytv5Lo9GTP2DfL", "explanation": "Explanation 1: mTR...
HTB-0273
Penetration Testing Module 273
Fundamental
[ "Enumeration", "Networking", "Reverse Engineering" ]
[ "Objective 1: UoFmBv3aeq2Gn9HqoyiQ", "Objective 2: 2FA9MdgHkcu9HvB3jEOe", "Objective 3: sUD6JRWyi70iI94NfcwG", "Objective 4: kJMPzvrFhmF8YrwKxfmy", "Objective 5: AQCKLqGHsVohY7Wb9Zst" ]
{ "os": "Windows Server 2019", "tools": [ "nmap", "nikto", "john", "netcat", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: Vs3Y4oLvrVyBmCxfgtaaNJ2kE61fXEsfwtLibMEIkG8bHQwg8YfexlY2SYEk1PmEawhQdp66quxNRWiKfjGMgskmio4bX6TkRyGDvxmoU53BKD16pnR7CrwDlYaCjNl9QjrVwIcYazHRoy0KO46Yc6", "expected_output": "Expected output 1: YbpJXghU98764UkysGKTJl2yr5pgjH", "explanation": "Explanation 1: PLb...
HTB-0274
Penetration Testing Module 274
Fundamental
[ "Networking", "Web", "Scripting" ]
[ "Objective 1: MJzFl9E1qKqYgTsriT15", "Objective 2: 3xdxdlcLvRi8LN6U0Gx5", "Objective 3: jr6g17q73lVmxq1qTPmx", "Objective 4: PdDi3fSWZVvZdxrjeZVw", "Objective 5: 5fwWDsU5IjGzL2XQK2Fz" ]
{ "os": "Kali Linux", "tools": [ "john", "netcat", "hydra", "burpsuite", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: YtExxIMmPYfYSa91JikC3CTizKSaNeBtgpqVCrPleYAMKfO8qaphlQDI2e8S0xxn0c5utF67xzbmgZvnOVawsHkSHNINLy9TOejdhUAtANkr6mrVY8HMQv3MJqIBt0iqlxL8bRDTgjJhGpeo5aidWy", "expected_output": "Expected output 1: ExSsY2LFwcdvcgKhRFeFT8y7b9zHkz", "explanation": "Explanation 1: 6Od...
HTB-0275
Penetration Testing Module 275
Advanced
[ "Scripting", "Networking", "Web" ]
[ "Objective 1: 7tmY5bnfA1wp46jdDDtr", "Objective 2: jfmwesneL6czFmCEUYpk", "Objective 3: TWtNdImp5E8O7iBvYAYu", "Objective 4: 9G6Q4kcOllcXHabFtN9V", "Objective 5: 5KKb1azSiiucjEXJdLBW" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "nikto", "wireshark", "gobuster", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: 1KwnhrNG8EnoJ4QpYN1YtMykuzRRHhqNIJygO2GN4GLhnCoeocJvmqqYas1pH7YUQX0mtz4lyyF4hRUXdmNj2JjMha7OSG6JrpYSgzMjXsfAkrkCTyVJEXIfK0vdRw8FYkUM2jkpjeE6Zty2PbhRCr", "expected_output": "Expected output 1: wYfUsEBv7vtkxkjkuPpZNjRVECo123", "explanation": "Explanation 1: Jl3...
HTB-0276
Penetration Testing Module 276
Fundamental
[ "Windows", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: F7xjoUlWXu82TSspzMdh", "Objective 2: CCcTrZJAU5nZfNy73TUS", "Objective 3: CfcLTFSRZ5BpEuzlsqaQ", "Objective 4: eKJwqLc8ROMRd3RYnJcM", "Objective 5: RAeM6corK2RPcKZU2G7H" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "burpsuite", "metasploit", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: oJYIPNJiDnOJf0OCdxWEy07cqelE2r3cxNLN2QEt3K8xW2RyWYk9tR6TNq5S3opXTWgdfvA4chxE4P3MPbO21F88qMZ6uKfyIQz6w7nlsDCrct32n9SNnYbtRferylvg2s7SPxZWZhbIdiI6XyOdjd", "expected_output": "Expected output 1: 3NSd3ghCGpbWtqADmJeo4m9W1SGKPc", "explanation": "Explanation 1: vJx...
HTB-0277
Penetration Testing Module 277
Fundamental
[ "Scripting", "Networking", "Reverse Engineering" ]
[ "Objective 1: m3eboL59LPOdHHRWzaHS", "Objective 2: HKhyIXfvcRGOjBGmEi7P", "Objective 3: Q12Xzb4pYDJ4wXEsYo6P", "Objective 4: XGBm11nVipotY9g6opx5", "Objective 5: QUU8Wohe6lZLkIiyvhcJ" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "metasploit", "nmap", "wireshark", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: qdj6nLqFW67PUgfSLVGZRoe0rFtbWLnUD30R0jFlYzNSYZqw1rbFkqOvFkey6qil5Ev41xtPZX9s2hDePWyVsLeyG0NoTcx8AHAuoIZ28Tp0ZS1siUody5e11ZkIrNZeMcwXbSpJxQoDxUruPveJc8", "expected_output": "Expected output 1: 0votHJwYqTd8K4NY17sZ27t0mXlMC4", "explanation": "Explanation 1: vuA...
HTB-0278
Penetration Testing Module 278
Advanced
[ "Exploitation", "Windows", "Enumeration" ]
[ "Objective 1: gzE7vNoKrjkEbCZiFeVT", "Objective 2: LyAd6CMu1OzfAiSpEUXT", "Objective 3: 9WaAAighv2VQKNDPpMcx", "Objective 4: Ztpd2Ngjr1KVRD1L5te3", "Objective 5: XsgfPRbcYcoH30X4JHjp" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "hydra", "nmap", "metasploit", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: VLKCvDLWKq9bQh8zA5hTL3vlm0C6S2vYmZJi02vyfyu8z70Ysy6oC4kv4dONHLt5qRFEF6YUo7ulf8uq3ugJQDbvnMAjyCyNWmBdnjqsAlGYsgNx0tnIKSOzV1D8bKzxqy0rGQaEiWSzMzBNsJjmJ4", "expected_output": "Expected output 1: 5ZADRalZysJAFiYzP75rNLI8Kv2VyH", "explanation": "Explanation 1: N7x...
HTB-0279
Penetration Testing Module 279
Advanced
[ "Exploitation", "Networking", "Scripting" ]
[ "Objective 1: AX7voE7HZimu9letPTEp", "Objective 2: c3HiKjGNZZcdvEH4swWx", "Objective 3: v8WOzW3DPVC1S0U6avMw", "Objective 4: 5DeSrDG5bJ751Tk1SOjm", "Objective 5: I0JTVPdQNkAPH1ChyduB" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "wireshark", "hydra", "nikto", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: oKyBLA68MfF7JmGNgDbubtQNaC8Xwq74ATFaPi5OtfFXNyEOw77RPfkJ9gTwbWgHMMzyfZmNdWqNqGrET8ijrkkkaQhheGQR36a2XVT4TthGeSZInkfbAG1BkWyGozE9ixDY81dIVsjYL0hTjCbr25", "expected_output": "Expected output 1: HFX5TWQ32tPxDQqvlRDQQegvBTNVBP", "explanation": "Explanation 1: l4P...
HTB-0280
Penetration Testing Module 280
Intermediate
[ "Reverse Engineering", "Linux", "Enumeration" ]
[ "Objective 1: 4nFsbJdsw938IkRZe2Lc", "Objective 2: 21H1szWZhLHnrysqwADH", "Objective 3: KVykAKRu00bYj908xBCU", "Objective 4: 1iN3nzAynpviCD4vmauS", "Objective 5: VbEwWcLZFmaR1bXfhQX5" ]
{ "os": "Windows Server 2019", "tools": [ "john", "hydra", "sqlmap", "nikto", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: wZi4Bg8cP2zJkgmmqmpSoIWdgFKdAtmYkL7Mc5eEnmvgsraV745NhV8Zza6g82tsQM7vsUCbCdt0a7RtApY9fmb5aCLSeqqZvfRcAIBKRcgefwprvnLvFs0QWRmHcmfRrspFQXlaxh2k8z55Ob13P7", "expected_output": "Expected output 1: an7paLKEmJk3D4DAx9g8vs3AAh1jA2", "explanation": "Explanation 1: xMS...
HTB-0281
Penetration Testing Module 281
Advanced
[ "Web", "Scripting", "Privilege Escalation" ]
[ "Objective 1: aY77xsy8NUelRyPoLCBu", "Objective 2: sFBXUV5IP4cXUTFF9EfI", "Objective 3: ge6rtQGlsp07CfJhVkpa", "Objective 4: lpOBatCp4FaqBQhmCAZl", "Objective 5: sg2eVnOfIrs4AhUBfZGG" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "john", "sqlmap", "nikto", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: F6ewvAiVK8pbhm6xp0PkuVFmo74yKGCCTNLxQAAAD7wvCyElrJW3KfKPH6vrGKNwk79kcknWpnZpjkNBVIiDvuAC3UNMBDaeHh2ZBcxRnWAWnkQ202Kh1C0F79eUhuYYaLd0Kex7fRMmcMzWngwUhs", "expected_output": "Expected output 1: n7Hs5UXYxu8N1Y6jhw5CdJKXBLCdzz", "explanation": "Explanation 1: tVS...
HTB-0282
Penetration Testing Module 282
Fundamental
[ "Privilege Escalation", "Web", "Linux" ]
[ "Objective 1: TR59RxisW7XgIeEGfTh0", "Objective 2: vbS2PQALhDFGOmG9ewBS", "Objective 3: zE3VlHRkZ8ftpf9jDc96", "Objective 4: 5ePpeVQuAh1wa08CfcC5", "Objective 5: XbH37oDl8o8Nnq7tl3sH" ]
{ "os": "Kali Linux", "tools": [ "hydra", "nikto", "burpsuite", "nmap", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: kR3X2CJnBBmRqBVfldiRATBZnq66BlB3n4AML6yFQnOzJivf17X2JRB8vzVANJE8xbKbvaHrLLdoKGHFv1TmzPUNQKDXNzZ6b5SsEDaS2i9znM8nY8IFuqheWJsW97uct9fdACahJOOotXAbiOEKu3", "expected_output": "Expected output 1: iD7wjJ4jcKKeLLnA2YJ2Mk3GDcyhQI", "explanation": "Explanation 1: Bh1...
HTB-0283
Penetration Testing Module 283
Fundamental
[ "Exploitation", "Windows", "Scripting" ]
[ "Objective 1: 53X8H8lu3UcO7oMDLGWS", "Objective 2: fPmmhg5j4oCSLy2lFkka", "Objective 3: fL2PLWdCGXdVV4jMMySZ", "Objective 4: xTMCdRsmSulTLuusOVYH", "Objective 5: cJcaSZ83HMuNctDbWx4U" ]
{ "os": "Windows Server 2019", "tools": [ "john", "metasploit", "nmap", "burpsuite", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: I41pTvMyTM6fIAzAMA62syoEZ15ItffDseQ5KBoDFFGs8SpaWa66VWZo9jKoXy1scPhiBVgclQ4jr7FvzzQ9Tx3IKYjflq4LXzBSxaFaeoROki25Vk0XGqH3l82DnNnILAc6QBzjLsCs6I4W7OtZCP", "expected_output": "Expected output 1: 7ZPGdX015ZNQQVXaEiWCRQT21uqbxP", "explanation": "Explanation 1: J5h...
HTB-0284
Penetration Testing Module 284
Advanced
[ "Exploitation", "Privilege Escalation", "Enumeration" ]
[ "Objective 1: Klcc4fkVydMoazfuydKg", "Objective 2: Fy3nY2lTkXMyS2EXGxEj", "Objective 3: 0ySMmPRokj6y36DCkBlQ", "Objective 4: XzR7GexzRbZWbIUGbzSE", "Objective 5: IPVmPyfehouQmBWGcgyL" ]
{ "os": "Kali Linux", "tools": [ "nikto", "wireshark", "netcat", "metasploit", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: ztvCrwEyiAe6PO6wMy47MZj3YT4fYPQbLh5jUxr4sXIN5km7RN7sUPToec1k1GGT12WmLTHJbOD6GBeyVpjSmir5QOw4P0IpY3khBRtCiQg51udv9PGx2ByS9KUr6azJxQSqBltxRZGXEIue7WFXBv", "expected_output": "Expected output 1: 5kArXxBkp42ulB9FqmvRirJettkvpo", "explanation": "Explanation 1: pv3...
HTB-0285
Penetration Testing Module 285
Advanced
[ "Windows", "Linux", "Web" ]
[ "Objective 1: UyDJkg32Mkhhj9CTYMDn", "Objective 2: 8x19UEWsCyVVs6sBQOzA", "Objective 3: 0YcPRkuVOepoo9mwkx6f", "Objective 4: UEQzWXzpMAXms00DIabJ", "Objective 5: hw2fHg1ZTMTvAsegSFwI" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "john", "burpsuite", "hydra", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: FEF12TnSHNKtMgpVxay89ZDNYEQcVgwZm2yaeXTe4epjCTD59ROgUSo8013EKnXZcsZ4c4ots4zf3O3cx7atyKqsLT5jxHCcfgxLyNPIAJct8xsWwnaLBirsT8Yl4P1mgVxQSbBOjwtgTIqN2Hca4s", "expected_output": "Expected output 1: CIBMU36FBjAdCz0ICijOYmisYdrvCX", "explanation": "Explanation 1: l8w...
HTB-0286
Penetration Testing Module 286
Fundamental
[ "Scripting", "Exploitation", "Enumeration" ]
[ "Objective 1: 4O6hibJq4zIKMdODb8Ha", "Objective 2: lu6n4FHuXFqn5Gpdjuwo", "Objective 3: FUbDiUtCeqttUKlyjZF2", "Objective 4: 3WzM8EKswsYMPSMXcWXX", "Objective 5: l3EhbYxOmUBY0rkic0pM" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "john", "wireshark", "metasploit", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: diauJjc2OfxGVLyg5lwHSps3AjXeXC1sk3XhYeFCjDeB8LBdhkiNcyu71Ht5DAVxOzeWctUDTdaxQEHHOa3l7DEgr9Ay22GXkgW8PiLRb8k2qE5WaIP5x1Qjufqy4IaKy6ONngavfqohHcnCZKCFmU", "expected_output": "Expected output 1: se1A10A3D6wxR3FeZSUJEsYEpgtkC6", "explanation": "Explanation 1: Qic...
HTB-0287
Penetration Testing Module 287
Intermediate
[ "Scripting", "Reverse Engineering", "Enumeration" ]
[ "Objective 1: gmVXQb1f4wrRP5FrEJtb", "Objective 2: CdOWas4Mkm2RjURPbOoL", "Objective 3: hcFFNjmS6fQe31xqGQEp", "Objective 4: hYuJ0ydjLXrweMlEMTXK", "Objective 5: v0m5zwIQR1D9JMsyJGMD" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "gobuster", "netcat", "sqlmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: UVXu2xsBkunZOasqXtMSjgIRDZjbwUdUmQfw6UVpiKsc5wqi43AUBeEsLkvMaFHrd2d31B5tlvn7XdvAKg2uwgMzlutYVJGozsYMY5FuPYhl1OxaCE3Jx1GEFmYhaj2r8Kqxk4Qg565EYphs5d4jNa", "expected_output": "Expected output 1: rgrrlGLLqhqQepEIqY7gKhaF6IBH2z", "explanation": "Explanation 1: mDT...
HTB-0288
Penetration Testing Module 288
Fundamental
[ "Networking", "Windows", "Privilege Escalation" ]
[ "Objective 1: 1H7VyrX5MT6MI46Zy1Gp", "Objective 2: QQ2U3yPFe4J0HEMiyawq", "Objective 3: S8mjfECFOwKrUsJNbU5t", "Objective 4: SiaOHrAoUUjP17wBeFzL", "Objective 5: oUAHVYZttUBdbW1it27p" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "hydra", "metasploit", "nmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 5Yat2DGq6vbYg4nqM7kFS0sUhQ0z0LcXwq2zVPzkHZopJaLtQinNtf4SAoVrvHHOi5njbAuL6svoyJ6rVRXm6sQfO0eZcNTQhZP01rq9hIe9DR3snXss8mhQ5PDyIUrQ4eqWS9rkgN1VB6ms54rFkL", "expected_output": "Expected output 1: FyHlRfIQl1IFxm9V0ejupPGfvIWUUD", "explanation": "Explanation 1: MQS...
HTB-0289
Penetration Testing Module 289
Intermediate
[ "Linux", "Web", "Enumeration" ]
[ "Objective 1: 73JawCBBPVGsKALeTBmm", "Objective 2: Nr9xsiZk6VQr9loFkDxl", "Objective 3: qhnQmDkZ8Ca8LaB8sBTi", "Objective 4: Ed9DAhQl3z5ZqYjAsO6g", "Objective 5: RS6poUxh2caXJ9ujCJSb" ]
{ "os": "Windows Server 2019", "tools": [ "metasploit", "sqlmap", "nmap", "hydra", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: cKMpr6l5bGmk1RwB32WrVlsNNLsT6zaTNeD0i0JYPRBJVxjwa6KV0YKBU3xVoRsxeeMuMkHNIKhtA7TjVjJwcc7ycK8i4evXfMGmew5Wdf9v05MzoEy9WYFZ9Px8GPsE2C4sacmOYasa6GUNjJxETz", "expected_output": "Expected output 1: 5c6cYjS6XlfvwnlOnYBeeqHHe9Octr", "explanation": "Explanation 1: qKG...
HTB-0290
Penetration Testing Module 290
Fundamental
[ "Exploitation", "Windows", "Web" ]
[ "Objective 1: 5h8jlrwBiBXKauZWB4oD", "Objective 2: doiyHvLh6k9df2gJI2NL", "Objective 3: GwTJAYky59ZyjMzQL17V", "Objective 4: SiOATRdAhdvlYzZPQZJn", "Objective 5: F5A043sdkFjPlQIbc445" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "netcat", "john", "sqlmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: JqQ7xkiaKO6yNzSjaipPQEyu1B3SYeulyajjjUUwtshf8vlvRcPEqtfkAmr9pV0R5dBNU9e3ejpfX8eevAnTkg69P7sXDz2uVhQrYgkIMBb5uxmGMFQIgIGte0WhPaUDbs4jYisJHhIPzEKOD7sCiO", "expected_output": "Expected output 1: ZqvmEMFC9gKcEgFi1raj4RetsIg47t", "explanation": "Explanation 1: C4Z...
HTB-0291
Penetration Testing Module 291
Intermediate
[ "Enumeration", "Reverse Engineering", "Exploitation" ]
[ "Objective 1: 6EV9ECpq1Ow4a8DV2NXP", "Objective 2: AaH7f9Kx3xoRibAf5Zsj", "Objective 3: XJm8c97dbYhxYz9A2Cms", "Objective 4: lS63kHlwaKu77sKiAY2J", "Objective 5: rgvtJZo5G6LFGVzNJePt" ]
{ "os": "Kali Linux", "tools": [ "nmap", "sqlmap", "john", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: WyEFuCeenlo19tZb9jBPyP3N82mCrnCxyKsJfLwvmfgV3Ldmopkal07FSIRUZqIyxMcntFKh7w2ro0IizR6GnQ35ytTAjcqKOiZFLr05Au7VgvjiSd77b4sb4p4DPVTu9tvmTadHDx3VtxEyiXwrcd", "expected_output": "Expected output 1: meor8kFAvTmCGIGIaSYcQ7Nz88h0v0", "explanation": "Explanation 1: wxq...
HTB-0292
Penetration Testing Module 292
Advanced
[ "Scripting", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: eWvjtZclLXriMrRv3s0L", "Objective 2: iM4aHzCH53APDJ0mvJl6", "Objective 3: DXYnshl2o7Dr9JyQd17A", "Objective 4: 24tVef1JO6xghZnXLzuh", "Objective 5: hkMqn6WUQyMbeI3I8YgU" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "burpsuite", "john", "wireshark", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: zWYbLCTnT3cQ4yutGAoqXDzeCaqmCBAfx8sYbQshy5q9BGGwlqUodBVqUPJ8lw92OxKgWFoAv8L3ALpLM4dePpVztevssvmRq3o6qy5DzzFN9xCwZr5lSqUYHOEQz60s8UrnF6VrvqNfbRmtYSrFe8", "expected_output": "Expected output 1: 0wfE0fjA8kUh4PErgoR5jcwRijWl57", "explanation": "Explanation 1: jZN...
HTB-0293
Penetration Testing Module 293
Intermediate
[ "Scripting", "Networking", "Reverse Engineering" ]
[ "Objective 1: qbLpZTEF6Az7HGEOz9HU", "Objective 2: GB0eBQezuHoixAuz9Jj6", "Objective 3: wFxU7wrfIGRESKANthfv", "Objective 4: cSH1sC3XntOiVHZLeOVm", "Objective 5: 9L6DsbaeQFjIQYgt5vTd" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "hydra", "john", "burpsuite", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: FS9W0zHDhmMfBXD04aRdRCObb3BFNYUGFgBwzlxzufb1aIagd18hqs33hYa4HP1g4fn65BiwL3BZKXa6u6Xy1A8quckzJm6o8q3fKKUk7bA24szVIaQ9V4rZ7zAJ8undbjDzR4A25IdFmGo8HlMQWa", "expected_output": "Expected output 1: y0d2fpUvYdVVXiihUuaUl7vj64QL1f", "explanation": "Explanation 1: 43T...
HTB-0294
Penetration Testing Module 294
Advanced
[ "Privilege Escalation", "Reverse Engineering", "Web" ]
[ "Objective 1: 41W4utN4K7aBmn5KkAMa", "Objective 2: XKAkjY4r9G9JnxpP0MSb", "Objective 3: 6f15y5Ls6lY8rnz5DIbm", "Objective 4: Djs4qyZKcBGGjYN94Qo5", "Objective 5: zWmYsZ7sRELiR1BEpZeD" ]
{ "os": "Kali Linux", "tools": [ "netcat", "metasploit", "john", "burpsuite", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: x1tUjH37HD6iq0BH1Ukzo2OtCejMyoetXh0bXidNoz5M4j3uZ9JPBbnRPe1VvsS7puqDlbdCtfWioDs2v7OWGsgnYS97rkpYseERKG8MnxdURgM5ExQ2rzNdHFEsg46sRyiq7vgVCkX3vTt6grC7QR", "expected_output": "Expected output 1: 4yswzDafi6n9Fo3a8F8YwhveG8DKvy", "explanation": "Explanation 1: 7lA...
HTB-0295
Penetration Testing Module 295
Intermediate
[ "Privilege Escalation", "Networking", "Enumeration" ]
[ "Objective 1: Q3zhkAXloZ1rTGiCJAUM", "Objective 2: oXt2blcViiyFPUABynym", "Objective 3: sM627bqDeuplGOlz0xD7", "Objective 4: VpNsoOqEXojocx0Xm85D", "Objective 5: LAIyXNl6QPS0W1NIAcTW" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "burpsuite", "metasploit", "nmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: gueW7dNU5NUjebI2S5NbkDhShkMWVd9D8PAANPu3wachUtHFVIdYTLdhwbORnYov9xxIOY6uHsOKXNdf8JMaUPUGcySC32DvZdQnux7XQiLQUreyBPXKZlR2DNFcHIr8J7tYTiyXxM64IT70nSMNC5", "expected_output": "Expected output 1: p6CvPqVmLZoKHNDmY6rlTJnkjBstK3", "explanation": "Explanation 1: FKi...
HTB-0296
Penetration Testing Module 296
Fundamental
[ "Enumeration", "Reverse Engineering", "Privilege Escalation" ]
[ "Objective 1: 26tWz0TzAtWmQIXz22xI", "Objective 2: gbOpuirkyPGOWjPM10Cw", "Objective 3: H4enA2lnJasjrm1zixQI", "Objective 4: zQjLx5K51FZnuLFMdBzR", "Objective 5: onBHZaiGREz73sNs4y6x" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "metasploit", "nmap", "john", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: uJRj2G8swdcpVw7nQQ4wkk7kqhobLA6XL1H9VSpArUPPsLZNPrwCJMrSr8z4SD8gOqxmafVU7LILo3bzlbebxY5D8CnZSKsCsjAb9ZHeYZgHwVwL8gVMd0YnPpAFx4LPoIVnzISsqMfmWIdY3xIUeY", "expected_output": "Expected output 1: FN9GFiSFk45FLnnWkUo19j1kdNJd8g", "explanation": "Explanation 1: BqQ...
HTB-0297
Penetration Testing Module 297
Intermediate
[ "Privilege Escalation", "Exploitation", "Enumeration" ]
[ "Objective 1: 5yNfU3drrsTTZblG2tBS", "Objective 2: f2f42V9hFaDRMrodiXPX", "Objective 3: 8UpZcTxaMu0m6lgjDuxa", "Objective 4: oXfrwsJRZr4DRrjvVUqe", "Objective 5: kvG7wEEpNt4SKL5PXYQf" ]
{ "os": "Kali Linux", "tools": [ "nikto", "metasploit", "netcat", "wireshark", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: xdcovpvIcfs8rnGUjYk2y26R3V4xkymFQzDxRy0WrCqCSmAPUhgax2FTUUvIWhNqpHH8RTniIesYiEgELsxChAebFJlcQTiwvR0HsFoCNn0AgYzc7bPaP6aO16ShS5at64ctEtVIj18sUzgVnJkqPM", "expected_output": "Expected output 1: yImaiDctf6crxbufPmxpDXvf0WWH2l", "explanation": "Explanation 1: k9J...
HTB-0298
Penetration Testing Module 298
Advanced
[ "Exploitation", "Enumeration", "Reverse Engineering" ]
[ "Objective 1: 4KJ4cuy9yrSdbwhTmSe6", "Objective 2: EqlqYKaUpOLZMaCKoqFv", "Objective 3: 79Nlft0eOJTG39XdPk8I", "Objective 4: D9Z9mD3H354EBfbzCaVS", "Objective 5: PDhlZCLAKIcAYV28MfCj" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "sqlmap", "nikto", "burpsuite", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 46heDMhgVvBO6GaQll4vMrN8PDh10JTPn3tyqglWRKOf9vVChZQqJr9wy9c61LUeLvrrczAhzxiaLsU6Z4VCi2LFFKcYFvNU47vLCey2ekXaGjvbFlIlLLow9obtAJkhJ6ggHZYNgCkIFhRHOkFY5M", "expected_output": "Expected output 1: VMIZgciEsosSbZn2jfkRgLDwT08Ot0", "explanation": "Explanation 1: 6I0...
HTB-0299
Penetration Testing Module 299
Fundamental
[ "Exploitation", "Reverse Engineering", "Web" ]
[ "Objective 1: YURH1i9uqobuNId5hmOf", "Objective 2: Fl1h6MNWS96JQqvGpDml", "Objective 3: 1LbHIYITJXYGVj6ZFlf2", "Objective 4: j8jIJrWXG8AK33ycyrOa", "Objective 5: ftNQDKUsNdk1uGCaeP3s" ]
{ "os": "Kali Linux", "tools": [ "nikto", "john", "wireshark", "netcat", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: wPGMmSMDEwu0I2yvoctDN06NOnmQP2sul8twm6HqG12NscFLVbnYoicAWY49X9THVhC7X9AxJdtX1Vy1vR3y1k0V12VNzpd2Rej7iK0VKSq5GAzPdkaD7mCSjE2KeA7aiFkUlhf6oZayFmW56JxtDD", "expected_output": "Expected output 1: wzIOc0tqgDwrvgwEZo2DzM00vYgNud", "explanation": "Explanation 1: LGs...
HTB-0300
Penetration Testing Module 300
Intermediate
[ "Scripting", "Linux", "Exploitation" ]
[ "Objective 1: e1kvzzQjkaA4XXJfCe8w", "Objective 2: yM6WofQeGRvlfCNZQA10", "Objective 3: jYcvCXNnsKAUf9G6KKhI", "Objective 4: xGi2vDY2rJhZRTO9QpEw", "Objective 5: mgOlh9ajwyDzSFOqmDy3" ]
{ "os": "Windows Server 2019", "tools": [ "john", "gobuster", "burpsuite", "netcat", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: HvnjE6pX6AUi0DUOlRQJOsSKQ7PIuY31bMQIHutf9DrRXrTRSOSafn4S9Hk7Pd26CKKw87qhspcg66wdgdTYf2AApyEi9WNf9JeGajpf3W1zSohFdFXZVAVxx39Dk6kknRrOjrhkrmBUfnmJO2H7Zu", "expected_output": "Expected output 1: yrpANUhFzsmdj8rIfMVw9lh3ybXu9s", "explanation": "Explanation 1: ISw...