module_id string | title string | difficulty string | tags list | objectives list | environment dict | tasks list |
|---|---|---|---|---|---|---|
HTB-9901 | Penetration Testing Module 9901 | Fundamental | [
"Exploitation",
"Linux",
"Networking"
] | [
"Objective 1: oaM8xsVTcLlzbQhohelc",
"Objective 2: yEaE743jeHxHbSg2vGvy",
"Objective 3: AgL1PfGyFnyCrsKgtu1F",
"Objective 4: LicF80gsrgX4rNdBaPpb",
"Objective 5: flNI5oIHyx8VbBVE21XW"
] | {
"os": "Windows Server 2019",
"tools": [
"nmap",
"wireshark",
"netcat",
"gobuster",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 14lxiMp1ObTDtOVYiVxeYiNqKHNdtUhc7xG41rPDHUDu4HfMEFcGpEk0XQXydJ9gIDdJwCzuKjXtK54FCVOg9ba8Cr7FoxHGs5XUi2pFdDlR6ga3UNM6D89IlWj4Y9POmWUxeAeVG1MIXAssZs0AzL",
"expected_output": "Expected output 1: 33py51d6mhTD7uq2ujFooM7g8V2ZYY",
"explanation": "Explanation 1: uD0... |
HTB-9902 | Penetration Testing Module 9902 | Intermediate | [
"Web",
"Windows",
"Reverse Engineering"
] | [
"Objective 1: ighDfs6b5SKi0EVvxKuQ",
"Objective 2: 6a0k7UQMpIGZV2mGLsYQ",
"Objective 3: Nd9qb7w6Ozcjgln4bd6X",
"Objective 4: N2FobEF2KXbzOSqdIyMV",
"Objective 5: QrbXHuubn6bfBUX40aaQ"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"metasploit",
"nikto",
"gobuster",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: bempRtxqBlXERrPIzbtLjECDcYe1U3AQ2JJCrUhXeEBpbZhjJK6bnt0xPQRRsvY4eUm5z48w353F8lkI7LAazpuTaXf9KmfNrPVmtrs6wm6Jw2Sb3TN7JfjXqrOHIlZNTVkgMWRxYJVXocQtHsyzW3",
"expected_output": "Expected output 1: 4Kt5HD8IfrdObOuCBlbFtLKqLFdQ8Q",
"explanation": "Explanation 1: eBf... |
HTB-9903 | Penetration Testing Module 9903 | Fundamental | [
"Reverse Engineering",
"Privilege Escalation",
"Web"
] | [
"Objective 1: B8Eabd8oljxiSRwv6PcI",
"Objective 2: UyqmeI095mDPvKOLHh5E",
"Objective 3: F2x4vH4DrC5yWcrdyXrA",
"Objective 4: z9kyw4GYJUXr19xILiQq",
"Objective 5: TIjZu5jaLWOhJnYsRKay"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"burpsuite",
"nmap",
"nikto",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: ob5CUZHEQMiaaWAo15MhfTqZVGEhYljVdH4f7hqoe3nEkncGw3fIwQLppGDvZSNqOnyR6gPMv3IeTeYF5JnYqIccHihaDHrWjvgzp6QyzvJ6JxmZmOJ31390J1DW7rouXfTtneJ53GB3UyUbVFHzY8",
"expected_output": "Expected output 1: rFOB1XKVc1GmRkyfEPN91aOeqxcyeZ",
"explanation": "Explanation 1: Pwp... |
HTB-9904 | Penetration Testing Module 9904 | Advanced | [
"Web",
"Linux",
"Scripting"
] | [
"Objective 1: n8ZKdASg5mtSu4fLV3Ye",
"Objective 2: PlPM7AnDuCtoH9CQYvI0",
"Objective 3: 8qYK5ZGRvmdJxenjjKLn",
"Objective 4: 0QRBtyJTrWTTERIQ365R",
"Objective 5: bJm4UqLrIVXxI0JNjo61"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"metasploit",
"netcat",
"sqlmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: CA2p0T5zlLKhQOB0z0xk9EMqAmo3JS22jXNnXLir7OEBRWnczvXQ5ahwd2yTy2LlK9pGvEj9GJonHaK467VgieEbYyQlDalKKJC3BIyNg1dh4L6Yebqgw2asb4ha6RzRwYBrcSZuubxh0kN2zOa4rw",
"expected_output": "Expected output 1: ig2RZsL4VMrgoHQ4eIWL4fgtIeq9la",
"explanation": "Explanation 1: vAa... |
HTB-9905 | Penetration Testing Module 9905 | Fundamental | [
"Web",
"Reverse Engineering",
"Windows"
] | [
"Objective 1: 230hwRDCw2wzVFlZzSTY",
"Objective 2: D8Eh12POGVRrztUcPede",
"Objective 3: 5pFV4uIwCqvwkyh57xr1",
"Objective 4: nkMY8p6sIwZhPvrKWEVt",
"Objective 5: 9tfnUViHvjFlEwYu3ANX"
] | {
"os": "Windows Server 2019",
"tools": [
"gobuster",
"metasploit",
"nikto",
"wireshark",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: oVsJ81fdehwT2fQZJtiSFTMFcI7ox83BwbvpiTslhVF2rml1uGyd3FHgQOFzAHgKrXSNpF58jlGRz4iknhFGxJbFpiyAlKPJ18OF28paukw3bMOFbPcJHpgpt5lLEZv9kpeER8Ds3LMogwLcidQXTI",
"expected_output": "Expected output 1: sJLA2M0UF8GBTqgtQgRwAEbZIfZPQE",
"explanation": "Explanation 1: Taq... |
HTB-9906 | Penetration Testing Module 9906 | Fundamental | [
"Exploitation",
"Enumeration",
"Privilege Escalation"
] | [
"Objective 1: M2oi1xrkkuLPisEzby6v",
"Objective 2: 0O1W0fipSRWeLxfBuZK8",
"Objective 3: glBMgCjCX4Yjv59fYwUD",
"Objective 4: 4bWeQbZArLcFF23LR2Nz",
"Objective 5: AVjw7zSuICzMgQM7IzqC"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"wireshark",
"burpsuite",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Ci9GeljZ1tJKRVdv9bQttrSYNpkliL8QjWwTXdhjVJUGkhVFPfeXHdKoOFFqLtOC85eHzKZHDJ7NDUgygNChAEazUGdssFWRJWx4YvjAiV1E08aufobpiaBah9S6ys6FL6gfz2do7pXgkKGBeQzi60",
"expected_output": "Expected output 1: O6w6cUIl7GD7eMi3ryd1V8ZdbfKajY",
"explanation": "Explanation 1: xfU... |
HTB-9907 | Penetration Testing Module 9907 | Fundamental | [
"Scripting",
"Enumeration",
"Windows"
] | [
"Objective 1: 87IT8Ue4cPtv0gPp4GWe",
"Objective 2: Wz75aCmTqXDb7DooswVj",
"Objective 3: vHddZunA2XLJSUF4oy9c",
"Objective 4: 8yW1vESI7i5L69lt2WO0",
"Objective 5: DWAig7PKKVF8N8XcKjnl"
] | {
"os": "Windows Server 2019",
"tools": [
"metasploit",
"nmap",
"burpsuite",
"wireshark",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: WCyazbuUZ0SktiZ4wNrvOPAV2nvQ70azZgdh24sFIKf3q0ISBMSi8uMzSERjqRY7a5dsVth03J8XgXHXLUqfZqMyh0fiqRhvtJsKjdjk2aRPRR5h2zFoCB2JywUKsAtW6u9kaLh4r385HjvOiI21Y7",
"expected_output": "Expected output 1: RWYj9fzM1YsyrdeEYJ7TMrIsVFUDgf",
"explanation": "Explanation 1: 5KC... |
HTB-9908 | Penetration Testing Module 9908 | Advanced | [
"Web",
"Enumeration",
"Reverse Engineering"
] | [
"Objective 1: OUwlBLLIT88S8X6NDm7b",
"Objective 2: ZyWd87PF70PHHD24oBmb",
"Objective 3: fg1XhUBrB38lmLEwjugg",
"Objective 4: dud083Nc672gVHlQDlsA",
"Objective 5: PDOYxYaJJh0hvi8wTGUe"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"burpsuite",
"nikto",
"john",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: rBlwSxA8uizWmOenuhiDuEVjELNRYg5UYatye3WbSu6YeYKrfn7GOHEZCRTV3KbuAaYBA7jEPXuXuCHDYxbrjRQW22bYeLIs591eW5aXSJU6u7mnCk5xL68n2tPbQ1ObED2xUr9SBIs9VvN7lczU2W",
"expected_output": "Expected output 1: LElXTkPF05YlQozKn8DccFh0UmpYtV",
"explanation": "Explanation 1: cuv... |
HTB-9909 | Penetration Testing Module 9909 | Intermediate | [
"Web",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: szjSh6Zd610OZ4u6ddF3",
"Objective 2: Ftcoj7jAtt6XFv6b3EoP",
"Objective 3: sBL3wDPzp51ri02pMMk3",
"Objective 4: TU2NiJgWCjOzxUEsv9g1",
"Objective 5: MjG7BoboF3M37HltoOY4"
] | {
"os": "Windows Server 2019",
"tools": [
"gobuster",
"metasploit",
"sqlmap",
"john",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: wi2UefTjr3xiAp1j6BOYYzht11cwdkRzcXVzdt3rBO0eIdmxH0EptoBQfC6MDZk2nWdSyVVWc0jic4ZUhC7O198OESGE5VWLTQMpv5WSN5qF4Bwy1xX7BxRQtomtOgao0l3GuDtN9uUOGtNPzMV6ap",
"expected_output": "Expected output 1: IrUwjp8cjaYs7vzerGtgTlrsLhCl5U",
"explanation": "Explanation 1: Sfz... |
HTB-9910 | Penetration Testing Module 9910 | Advanced | [
"Enumeration",
"Linux",
"Privilege Escalation"
] | [
"Objective 1: FtSISDYiHclfP7y22rKB",
"Objective 2: P73rZK0Qeqj8apQ7CrNN",
"Objective 3: 163ZOwJHRLprTIMTkyiI",
"Objective 4: ZmJcYfuYVWzbhpvgOFPC",
"Objective 5: emRM1wgtsSIaMOhcXb3z"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"wireshark",
"burpsuite",
"sqlmap",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: vOAc90PB6JoxVylHZCq9phw2QQySwfiWOT9LcjBLSpUB8JkyxnHGGVAbi7t1QhiOEs4vDBMwvhGQIJJTKdGprUDBJwJ33zZ5UvhA5wW4Smixv6689pN16rdjf7NR7VMbHlgIUNbiI4HYHZwjz96FVq",
"expected_output": "Expected output 1: idY6JfiAtdMHHqz8PppzeVafTltNLf",
"explanation": "Explanation 1: N8i... |
HTB-9911 | Penetration Testing Module 9911 | Intermediate | [
"Enumeration",
"Privilege Escalation",
"Linux"
] | [
"Objective 1: cJ4Em6tiUHPUp85qs0Ag",
"Objective 2: qkPpgC0G2jNW6qx83SO2",
"Objective 3: wVN5Q5fEduCnk78JmCqK",
"Objective 4: HEefFWbfps00X9AXz9Qm",
"Objective 5: tKBK5pyU7gfSU5lPz9IE"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"nmap",
"burpsuite",
"nikto",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: dS5IoHTHb3hC742ZD9LhhRXjyAmpfo3YFw7Xn7oP02daIRyJrMec7i1z91Ns1cggFVMARf1gThWX5ZZVDKqxu72AhIgp20x3W35DcjOgS2iuhhDmDyA0NU5FyasxTUnTu28ntIoeu6LEO3Ng1gH0DJ",
"expected_output": "Expected output 1: sjcBifKvOBI0kXTzLI46XYh56aZC6Y",
"explanation": "Explanation 1: k8f... |
HTB-9912 | Penetration Testing Module 9912 | Fundamental | [
"Windows",
"Scripting",
"Networking"
] | [
"Objective 1: E2SyfgOJzOHdfJF46D52",
"Objective 2: RzF0XZgG2LWE1qV0pSDY",
"Objective 3: FsLVyHAQOAPloEbCFYFl",
"Objective 4: mb5qdTF2Rz0mDCIj6t8p",
"Objective 5: LoX3GclAGc5NsH8R2L5j"
] | {
"os": "Windows Server 2019",
"tools": [
"hydra",
"nikto",
"nmap",
"gobuster",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Q59G634cXtn9v1HOpLIboiF6P7ehljJoUvSVIAMf9f94w8UdCGq5SSI81AdF4CG55OQf3N7i5zxznoYiZu5YYwWNB5AMQ72RcYio2UmymUueJBjDpttdcvESImtFHcYiEXOQsNXcm3rGLDCGvwnjRZ",
"expected_output": "Expected output 1: V27tg3VSPiEZehJaL8bK7iUNiBmeWV",
"explanation": "Explanation 1: cK7... |
HTB-9913 | Penetration Testing Module 9913 | Fundamental | [
"Privilege Escalation",
"Enumeration",
"Exploitation"
] | [
"Objective 1: j4KODdEfV8VXDs3pMTL7",
"Objective 2: BFQ4avcTMpNb5cc4EB33",
"Objective 3: k1UUmG9m9wMJEwX3t1q8",
"Objective 4: Vw22RsK0wUMAn7tbEsje",
"Objective 5: 866rUukAjGHqb1CNp6Hk"
] | {
"os": "Ubuntu 20.04",
"tools": [
"hydra",
"nikto",
"netcat",
"nmap",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Qm89fde71tnmOMX3DR3fELvaeBQ7feFE0Q8WCOlKcE1KMqbxR3CvbSBTcRBw7l3l1Co1fj3QbGZKU4polO6BZoXIdNkc7zEYTtymncmml4oIvU4ck882jchNLxr6RfwOkHvx1wpLWgEggfmslayKbY",
"expected_output": "Expected output 1: k8TJTQn0asbSyJNGPX0kV5r9bKHS4E",
"explanation": "Explanation 1: MTK... |
HTB-9914 | Penetration Testing Module 9914 | Advanced | [
"Web",
"Reverse Engineering",
"Windows"
] | [
"Objective 1: qAOn9NMrgF9jX4Tz5qlU",
"Objective 2: 92G64fTGcFx6ZPHaLVp6",
"Objective 3: xGZGuoWTO3BrTwuB88Ip",
"Objective 4: L5WBIwIsevx9uJSYQaAl",
"Objective 5: NZWTzI65TYpyMD1fssYU"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"burpsuite",
"netcat",
"nikto",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: fKXsKvnKHh00Dw3V9gg0i9KpKayJ3uSzIuEabrtqhPBu0T4vP1qMviGWg7sP7SuFAr8DusKBC7TcjMz1a3L7xaFNZxIe3Ty9ezOd9KKnUsZRSqPe86Wz0M9JPR5yCyEU1uq4xtGLERQs123xxgTCwf",
"expected_output": "Expected output 1: BJSIYCfJ0RpZPJ7VJdFiZsEuefCJ6a",
"explanation": "Explanation 1: Cun... |
HTB-9915 | Penetration Testing Module 9915 | Advanced | [
"Networking",
"Scripting",
"Exploitation"
] | [
"Objective 1: h9oBEFOjtJMGD98zUaQZ",
"Objective 2: VuG9rLhzhKMWWxVxQIAt",
"Objective 3: bPjXak62ZcRucagGxHFu",
"Objective 4: abQr0begn5vzplMxy6mU",
"Objective 5: 34OFK3zRnc1H9VrctwSK"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"sqlmap",
"gobuster",
"wireshark",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: RH2V726cRPbYeWoNByO94hRTA06U2duSCh0BGxyV2vvzjYxOa2SwbqROG6XWeElP5b8wzWMTBPewnibidJn6IBRMResTCftNWqE0Zh9QsAoYeMuhhm3s1lQ3G73m2K6hyxpEBO0K8eK0Fz4H3lZF9Q",
"expected_output": "Expected output 1: McP6HoPt8zMZKkOxzBDMykN4PW5ajP",
"explanation": "Explanation 1: aw7... |
HTB-9916 | Penetration Testing Module 9916 | Fundamental | [
"Enumeration",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: LWxqJ0AdVEkZWR3cpegn",
"Objective 2: HqwUMC9V1CkBIQwNt1yL",
"Objective 3: bVOcS4cOmhz0JJZOERAN",
"Objective 4: RzEgHRZeOqees6BugHSy",
"Objective 5: zFvWCUsOGT9PmAKYkkL7"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"metasploit",
"wireshark",
"netcat",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: EULI0GuXmJxPzkyExCXh1GhiLKmcVtnLoCYufUbkUZj3r6zw9Z9jbqyCVCxDuRDuMG0SMnODf3Q5jE8kYseetHlx10zVcM2zLo6m3ecwE1OlVf3VGi3GmIRfU1gMTbqX29OD3WVz9WBKx67XYAt6SA",
"expected_output": "Expected output 1: YFed7qI4n8CCXGlBK8hjyPetBKz1h7",
"explanation": "Explanation 1: oRO... |
HTB-9917 | Penetration Testing Module 9917 | Advanced | [
"Enumeration",
"Linux",
"Exploitation"
] | [
"Objective 1: ZFfXZrTmek4D7EjXu2yY",
"Objective 2: B0El3BnZGh69SjIY9D6d",
"Objective 3: AhvlK464Nh8nhyWxRarZ",
"Objective 4: a1BNIjo9SQTeYBF4nneb",
"Objective 5: 4UDQZ3PQt1rwk7ORNfpo"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"metasploit",
"sqlmap",
"burpsuite",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: tcTtI5K4kQRgMtVrBFhWDOPEAfAmOFsynhLne5avl4ERgClXjL0AJS3wLu5NLDex95zWC7PpiyNEsj8BTCnvmtjs1dLXu2hUPb6O3IJaT0UoD8vcvC44JHBtOi8ydbN1zv3qZgAYpzC239kMEZ4ePs",
"expected_output": "Expected output 1: 1R0AwBAG94LIiacxOeEozA1T9nIaDa",
"explanation": "Explanation 1: MYV... |
HTB-9918 | Penetration Testing Module 9918 | Advanced | [
"Exploitation",
"Enumeration",
"Networking"
] | [
"Objective 1: tz7DzdFNV4GgsnQEi2oN",
"Objective 2: EzdDfMkJmNxpI5wJmutA",
"Objective 3: paE1cvKMCgiUlafNWTSK",
"Objective 4: Z25D15vp5e0hfU3BxEMU",
"Objective 5: Ga8O7iFsOQb316D4jolq"
] | {
"os": "Kali Linux",
"tools": [
"john",
"netcat",
"gobuster",
"burpsuite",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: D1ycIJGgMXsfY50q88GbMArFa0RcplZWcHTS5VvEwst4ADuRkSVtdCNpCr9GDi5L8QezTeJPYrYOAOQiCkUrxdiCSVYlQ84ex0iEdrRtskTAY01vouN9EnwFhrbH5uhXCwVkzxf6fBWEUIsUTVxtJ8",
"expected_output": "Expected output 1: wh5waMfNTxKHCGZiioBmKgxj0OSuQ1",
"explanation": "Explanation 1: ppl... |
HTB-9919 | Penetration Testing Module 9919 | Fundamental | [
"Exploitation",
"Reverse Engineering",
"Enumeration"
] | [
"Objective 1: 07xqPJqUN0UukgUpJo2U",
"Objective 2: eemH3S0UB35I86Qb29vq",
"Objective 3: MzAm1lnsKvQJHEWqszKP",
"Objective 4: 7tPXS2t7tpQZzvJKGnwQ",
"Objective 5: uWB3DmEtmw8OeV45B4i0"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"wireshark",
"sqlmap",
"netcat",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: QvgLGfIdBBTedufZFL6c6KtCCU9kykIloYJ30ypRSzaDVqXgtFMWYK3Tz0vbImuqpuQ7hcNd4mPwh2PanOrtStoLYb0bD9hBvDDgp64TOmq2evQCCjHrzGUE0hByIh5U9TQVfcZ1bkeYcIFo66oI0s",
"expected_output": "Expected output 1: pu9PLmqt03w2dIhYKQOQLdWZ0mOGxU",
"explanation": "Explanation 1: aTn... |
HTB-9920 | Penetration Testing Module 9920 | Fundamental | [
"Linux",
"Networking",
"Web"
] | [
"Objective 1: jVpr4tYisIObl62MqVlE",
"Objective 2: OLbwBNAFLFY98344NFiw",
"Objective 3: G5IyzeU24UuB0txyvUqb",
"Objective 4: rUhgj5tmvrz32eE4QaqZ",
"Objective 5: PNHcBjtajKQveFZIMw1c"
] | {
"os": "Windows Server 2019",
"tools": [
"metasploit",
"gobuster",
"wireshark",
"burpsuite",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: EiWgMsybyccEcoc6JciYbkddl7ojoU9gx2bRnHjxNM4arnzXQXcHykPWwM7cgT20JJpclmy1iGz2Nr5NxM6gltxGJLOzZEuvYGZntZc3oZWqrW8iSbkPfBqrDlBxkPvA7SZ6ux16pA7LRvjT3ws5u0",
"expected_output": "Expected output 1: bBuC5h2KgJx5JbcJaJDRqxHfEAH9ZM",
"explanation": "Explanation 1: GXe... |
HTB-9921 | Penetration Testing Module 9921 | Advanced | [
"Reverse Engineering",
"Linux",
"Web"
] | [
"Objective 1: az2NN8ybnmYBcESsFAy1",
"Objective 2: FQMZ4BsI4v4GoILvgGm1",
"Objective 3: bKkUF2f41a9JYqR7eZfg",
"Objective 4: QojhQeebMOQWm3PMYxet",
"Objective 5: xhnqVii3PGlqzhi7yBlp"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"wireshark",
"netcat",
"gobuster",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: XaPVmly3k8gsIpEsYyoHbRCs3b2BxNxzS4uqBgOjJCoYfbXpUS9fkQgxepkudEuHdMKLZBHEY3wfCGkGUssRjLVoSwycopG6D8OzS6RXJQ2IKxlCMQFidJsUmi4kgEQzzOu7zsy4miUvdbF5eKzDpa",
"expected_output": "Expected output 1: ISz8jEuqyCHhKyNrjehTM7VdRW9Kgk",
"explanation": "Explanation 1: Twb... |
HTB-9922 | Penetration Testing Module 9922 | Intermediate | [
"Privilege Escalation",
"Enumeration",
"Reverse Engineering"
] | [
"Objective 1: Xa9V96BF7M1j86PlRnhE",
"Objective 2: xgnL0jLOpQcU6BewuixC",
"Objective 3: uau4dMcWXQJ52X2kNc6T",
"Objective 4: 42Z09DGHZVxP6kNFjMZH",
"Objective 5: HXWPogOvCsHtF6WIwTRp"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"hydra",
"nikto",
"john",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 5vPTmDqa48sbNcPzUt666tryR6gqZbKEB3bDVhQcPlpTQPNmzcRKqJCwxvdpWNnG7aQrNmE8cO0WW1swYxtDhAn8mUbUTZaVEVa14fagBYoOmQ6o2BOXNnveimwpNw5vW39rSUU8heXurZkJh5Xkbe",
"expected_output": "Expected output 1: 39ybtvhdHbVZSDOQVAsoIxDr5RYYhh",
"explanation": "Explanation 1: L3V... |
HTB-9923 | Penetration Testing Module 9923 | Intermediate | [
"Reverse Engineering",
"Privilege Escalation",
"Windows"
] | [
"Objective 1: QL55AnO3IQnudKqjYUew",
"Objective 2: GX5qIbQhtUfKUfOk6VW8",
"Objective 3: 6Mg1PY6wMBwHBOukFfvH",
"Objective 4: Yxu2afA6vv8FwPQy6L8E",
"Objective 5: QL6mRBnSEKDZVtdaJ8Vx"
] | {
"os": "Kali Linux",
"tools": [
"gobuster",
"wireshark",
"burpsuite",
"hydra",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: j8VhavqKeDrnpNEEA04RlpyuHsMNxfktdpCq1KEor40PEXV6qkXRh1e4ttNaunsglIeyMRpBjxtrPEbadBXNlrUkEmgdPKy02IyLMzvCwpy7qf6GTJNeVpv1mA2o7cH3jhu5Ce6qLuQpHnsnuWJrqc",
"expected_output": "Expected output 1: zz671uFEzurnRjEXTARqGbPkmkbmOe",
"explanation": "Explanation 1: Oc5... |
HTB-9924 | Penetration Testing Module 9924 | Intermediate | [
"Scripting",
"Web",
"Networking"
] | [
"Objective 1: 6Tuuc2sFk4Ri8BRwVnHj",
"Objective 2: NKdKDkQydU3HW7BbXbqh",
"Objective 3: fTI7R0Wm3XTz5dCBDq36",
"Objective 4: NyQDmqyiB9k7wYYmcMNq",
"Objective 5: biU2U9Ww52dIfIQS0dSo"
] | {
"os": "Kali Linux",
"tools": [
"sqlmap",
"hydra",
"gobuster",
"nikto",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Qk5DmK6pGDoqrwfe2DI8p8QHcmrTAkgnZhpsLtnUAd8IxueRK51pvuNTs9xHixFEl4t6evhB8e9u2DwhEwmZGIR48rCvdZcMVPz2PXEydHJBjLXA74vAznKOgMKNjBK2dwudFBdqKWZLNkCpZMjouc",
"expected_output": "Expected output 1: 4C804hRCprbe5X21Bt2ynnLC9mFWOL",
"explanation": "Explanation 1: oaE... |
HTB-9925 | Penetration Testing Module 9925 | Intermediate | [
"Linux",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: PjqIVVDNNKU5DLq9Mej8",
"Objective 2: mXCX4jCrOy3moBQKi2Uo",
"Objective 3: nryxewgzjyCuA1CegWig",
"Objective 4: NxB9XlOddLhsbRnHvgp1",
"Objective 5: DxeSTic7fIMKr5XfmtRD"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"sqlmap",
"nmap",
"burpsuite",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: e91fdPTe5BU3cksB4BhUkU3YChy02nXCxzOQE4pQ83CcQIx8P5uWSvIglssMv01wiLlniWuQf5dwk6C3GGR9afXwW6t7FIGLOEpw26nTBdUpahv7fUepiYbJWZM2InG3R8pGqQNlPIvRg6DxBZycD9",
"expected_output": "Expected output 1: AE3zEBYj7st3062VGY4avkLoXE9dya",
"explanation": "Explanation 1: VZz... |
HTB-9926 | Penetration Testing Module 9926 | Advanced | [
"Privilege Escalation",
"Web",
"Scripting"
] | [
"Objective 1: ApX1d94cQEjx0W9eQnnP",
"Objective 2: PSEw5Dj02k87k4ZC34Sp",
"Objective 3: mUA26H0jrqLFZeXiTRTZ",
"Objective 4: BORmEImLQLyUzKWsRQL8",
"Objective 5: rXQVAobCyNAy0gp0iYBj"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"netcat",
"burpsuite",
"wireshark",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: CQY5claW381Nt7I7qpC6bIXgqatQTIsvZ5ehz7fMmhtSP2TpXM9giEK3Fk1TFI0Xmz5baTjKfVV6gWAtuG1q0hXcSRoO76KkwMvSzRefNkXY0YiIpmWzNqr10GabLO0b72d4kWxcmX9QQJcPBZPjwA",
"expected_output": "Expected output 1: M5925ccj1rvdrC8XtYaRzrBENw8BiC",
"explanation": "Explanation 1: 3yG... |
HTB-9927 | Penetration Testing Module 9927 | Intermediate | [
"Web",
"Reverse Engineering",
"Exploitation"
] | [
"Objective 1: R9e7997dcllMqvfOsxsN",
"Objective 2: 0hawdmzAcPrsmp6FjAQW",
"Objective 3: qGnbURYF46qHb6RigKKT",
"Objective 4: wN3EyFSSszc4xLfwDG4A",
"Objective 5: aOvJLP3dlcFGzhcr5Exh"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"john",
"sqlmap",
"burpsuite",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: mxt4yZipBvMJrgC9I6e0MjCuXMWXFeqhyQ7MzRdPaEA1fQUd7Y8X2CLocaNLoTUdhspE9fINd015DBZ2a736F4x4d9E0diqOAkM4AMRLJbMpTlQ9lo39clEt1kWKwMtpOE54ZYauXeDudAIUnGoTDC",
"expected_output": "Expected output 1: 7FHnNP0ueyrZh8Tt01fGf27dhtwfXM",
"explanation": "Explanation 1: Zww... |
HTB-9928 | Penetration Testing Module 9928 | Intermediate | [
"Enumeration",
"Privilege Escalation",
"Windows"
] | [
"Objective 1: hBDurfTmm17Lu41Bw32g",
"Objective 2: 1sJy8Qv0XdomQqxL5Prm",
"Objective 3: dz6YNNz0KeMdelAYiD59",
"Objective 4: RTwF727FScbG0MHEe0m2",
"Objective 5: cEKT4J5VjyKqfzTZXV6h"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"burpsuite",
"wireshark",
"john",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: q1f2mEucT6a3JsZjLXZYBVWrID7e5W6UcTb27YQZYKmkUHlWDeJbqEp6HU1flLsONq28kuSxPO2TxlNysCx26D7PadCHetdxy3nPKXxH3MGiyLGT5TghRZGFRKD0PFewL5czdepfJkOpyb50DOYnFf",
"expected_output": "Expected output 1: 7c308YvbhV8rg4KY6ozfWjmoFGQHNX",
"explanation": "Explanation 1: 4Sp... |
HTB-9929 | Penetration Testing Module 9929 | Intermediate | [
"Web",
"Networking",
"Reverse Engineering"
] | [
"Objective 1: hKZZe0XOo6kAHdW7m0eY",
"Objective 2: toL6s48II4LTI2FkKztg",
"Objective 3: Z6ZslpPgV53d5DFI6sbt",
"Objective 4: kYFPMvyq2vBodpQN2LcB",
"Objective 5: TTksu1KTR9353p3GoDqK"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"metasploit",
"netcat",
"burpsuite",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: hMAacZ1QWpYxDk6o9Jnvjb8oxJ7rnQK2yl4XhChIorRpickJmsBPZ1dOLSUA428KN5XXCYcYGBclKIDLMtCVw9Dj4hJcy1BLguQeVbn7o33llnTEULi4U4lZrMivPiEjrGmHNzNGKoxcQt1hR7Sxe2",
"expected_output": "Expected output 1: 0nDX7Dy9Cb2tyXkGtMaqrwjwxEbmMj",
"explanation": "Explanation 1: rXe... |
HTB-9930 | Penetration Testing Module 9930 | Fundamental | [
"Exploitation",
"Networking",
"Scripting"
] | [
"Objective 1: xj7Teo5U369QOzNm0FNy",
"Objective 2: qMORQa6qbIPM3cuVwZij",
"Objective 3: yZrAcdadqfiM6FUvurcS",
"Objective 4: bNZ4khu1JqvvKCLTw5Sd",
"Objective 5: 4Wa1zp5h24ce9Yw5alKp"
] | {
"os": "Ubuntu 20.04",
"tools": [
"sqlmap",
"netcat",
"nmap",
"gobuster",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: GEdnpEo8cjWv6Xi3f2TYGUPPTYXO6lWMHeX5TgC8z7dcIXQrnvNyZehGKNQeXcsJuaxToPcjTxhyHDFY2iAaTXN2yIHxIUWKrrhnCzGTzDCmH9VSkgVTZu6jmlB6U6zW41Q010Goxg2wlLH9BF5Dk5",
"expected_output": "Expected output 1: qH4TJvTzVFjXbZO3zdS1f8eh7gguD4",
"explanation": "Explanation 1: ISG... |
HTB-9931 | Penetration Testing Module 9931 | Advanced | [
"Networking",
"Exploitation",
"Enumeration"
] | [
"Objective 1: nCPsVQXPLNv5vWIM7i8w",
"Objective 2: mGwzb9TctxklaM9wqnZP",
"Objective 3: qycDYBmg1aoni0ayh8R8",
"Objective 4: sTWWQNqh9MZO7AMuQ9td",
"Objective 5: 60VN44jeTpOETvEzDJfd"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"nikto",
"wireshark",
"john",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: PJc740FuCdQCKXgnqeJ96JqIL6axLvZUGejeJqbcC4EGXJicqIBHamCrxUgPGmmIg0fjKApA3gG5csRhzsDhJ4OnO9JThegKxjp7PwzVyFuQs6BwHpxYcwVD00AlS9p9aNerpSBK7iSvgpMS0EY7W7",
"expected_output": "Expected output 1: COzEdTnB6skoWF13HfAcMkuiC8HNpU",
"explanation": "Explanation 1: YwT... |
HTB-9932 | Penetration Testing Module 9932 | Fundamental | [
"Networking",
"Privilege Escalation",
"Linux"
] | [
"Objective 1: wCmtFeqwDTsbwEoDypbh",
"Objective 2: C9td1BbFgDIjUEOhmOhi",
"Objective 3: 9lqIwTXSGCQy8iK4cgQ7",
"Objective 4: y4OPvbqsCzUpVl89Nz7m",
"Objective 5: kV3UiZGkg9kV1zOBax5O"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"netcat",
"wireshark",
"john",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: vEoOjI1gPuh7bAK6z7azO7QoZHtmORusrRlHkDGDkAwIdRMlFgVygfozfsUPwab62InF1q0C7IfnNU7brjfa3jtvSO5WyRvm66hp32SOiQY1zugqHCEvBPRkJ2d4pTnVSMIa7mb0lsPn33tAKx03Xy",
"expected_output": "Expected output 1: k8B0F9VymRxViR9mtKyEIdB3aR0EDL",
"explanation": "Explanation 1: 22U... |
HTB-9933 | Penetration Testing Module 9933 | Advanced | [
"Reverse Engineering",
"Web",
"Enumeration"
] | [
"Objective 1: Vvx1FRSBsh3vgpcYvLKU",
"Objective 2: DnQ5PFlwQ28yWMEzbRAN",
"Objective 3: rlY0tHrBZV9VabGY5k6V",
"Objective 4: LxJFyJJRPYA3Sy2J2iup",
"Objective 5: xCpChY956VXqCeyfhG4d"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"sqlmap",
"gobuster",
"wireshark",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: IlReRIgoszMSqA3zfwOsNWxeWdOcPukwyO7e4qjnYZmFfqf13kCSTNkvBeeSfNbpZUjtGyxPv8wqWXKHCcHLSsf1XhIYn0ox89MHAV8R98QW1WxfQZKfQJYYCxQW4eZvhJKwOOmHPjLOqEbNLPr2TH",
"expected_output": "Expected output 1: vahDWYHk3JNMOtb31TfzXkJPGaMKjx",
"explanation": "Explanation 1: YrA... |
HTB-9934 | Penetration Testing Module 9934 | Intermediate | [
"Linux",
"Reverse Engineering",
"Windows"
] | [
"Objective 1: KwtVtL2Bid9BXX8NfI6m",
"Objective 2: ICjVrYCDDZIuKZvz99wq",
"Objective 3: Wv3J2Xzscc9Aas9SU8m9",
"Objective 4: PgpPbrdCW7znWVsNn9XE",
"Objective 5: DBNG1DAC8wKzNMi8wRfK"
] | {
"os": "Ubuntu 20.04",
"tools": [
"hydra",
"gobuster",
"burpsuite",
"sqlmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 5DeF40oF6di2bko07fXZhubBUfJHyLFiPUWWZma6GQfzLJv0GDTxLPmEijXei7QMLw5Ko6VUFmmPXOSdEgoPhiotwzi2ETBgwi6Zppicaczk9ZxPf3oA46MhgePg2F361lQrdjqzwz2JOpQvnUqVOa",
"expected_output": "Expected output 1: ZzyC2a8jmvSAGh4cDhPvl1okkpyaqY",
"explanation": "Explanation 1: 8Tu... |
HTB-9935 | Penetration Testing Module 9935 | Advanced | [
"Exploitation",
"Linux",
"Reverse Engineering"
] | [
"Objective 1: znEARxxGqt4QjybHRsu6",
"Objective 2: fFKOXqI5hwiVF2cakNJd",
"Objective 3: DFnGnYhr0SIfoo5qSd0P",
"Objective 4: JvIRgr4U9GWpBI1MX6Wa",
"Objective 5: cJ9tTx8Q8DEApcnSmdkM"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"hydra",
"sqlmap",
"burpsuite",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 6aoGJubU7aF4Jk8m9mHCGiLzP3OKyyh5fYSfSyxbNnW6k68HO2IYJ8TzDfbxDPtVpuT6MHex4v4u4uEYk5Rxzb0GNhYsLZ5D8VnKKvvp91tYdTgXaNQLkvl2FWI7WuELZhkSsUYFh2wbrT3XAVVgVl",
"expected_output": "Expected output 1: eyWymLQvV4FnsNPml2PY7Q8VxO5aHJ",
"explanation": "Explanation 1: v21... |
HTB-9936 | Penetration Testing Module 9936 | Fundamental | [
"Exploitation",
"Reverse Engineering",
"Web"
] | [
"Objective 1: 5yfbIFSzx0qcknoso1C4",
"Objective 2: hxDdHsmaVia91SxaHWnP",
"Objective 3: yHaoyQkr9yPbC8MhjLUU",
"Objective 4: v2jIsPdUmN1YopDpvOSC",
"Objective 5: 948xsO4tIcqBS4OcAJbB"
] | {
"os": "Kali Linux",
"tools": [
"john",
"sqlmap",
"burpsuite",
"gobuster",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 2YQhQ8IC5C3SuO6KOertYeLc20c40AqfgWRs4FAPv4rdyBkxtNrWFwKy5RbAErfO50XYSDdm5i48zpLaZlZVUKRsSxl7HO00VjozgRp8pjmtdQ1Viwqg1iZ5tkoZtMh9DEzYPEGm3UzNbjCdJ1yoi4",
"expected_output": "Expected output 1: NcopjWS62swTUJq1YdUSGbaj0GTlmG",
"explanation": "Explanation 1: vJq... |
HTB-9937 | Penetration Testing Module 9937 | Fundamental | [
"Enumeration",
"Networking",
"Privilege Escalation"
] | [
"Objective 1: LTqxv5Z43b7Xj0ESPFzY",
"Objective 2: bQbAdCmzl7AI3yTdApeV",
"Objective 3: XKmiFoGA4uqlyULnB88D",
"Objective 4: 1fvdVERPJz3MD0ztlfG0",
"Objective 5: 0viGew7gBdSzxSBQqAjH"
] | {
"os": "Windows Server 2019",
"tools": [
"netcat",
"sqlmap",
"gobuster",
"hydra",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 0MpEwOQ7xGspkW4BYORslVZDyhYfcJeYx3ddw2rH85k8h0DHcwFyeOpfXa1B60tLvPlbK2eIApgYLNcdQ9U7B1b5kazt6XT2rFmWjNc2vqleam6tp1hIh7UIpWzm26sdFZnqcvXLPjvOirGAJCzz1V",
"expected_output": "Expected output 1: PcB7oTqaYClfKb2zEvJzyQM0pKLPlY",
"explanation": "Explanation 1: rAV... |
HTB-9938 | Penetration Testing Module 9938 | Advanced | [
"Networking",
"Privilege Escalation",
"Exploitation"
] | [
"Objective 1: fHwsmQYRD9q27hY7jf3J",
"Objective 2: E2vj4PpAPeGldURsO6u5",
"Objective 3: Vq5E278aT3GxyrjEm8b8",
"Objective 4: KKjTi3pnDa8mMDe6eaFI",
"Objective 5: Yq8L1p9wfLxXWh81kquv"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"hydra",
"burpsuite",
"nikto",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: QIgl5QRXQuVujDb6d9byPq7DM9AYCekavyCFOPklklld6KKyjRafYS6FbdgZU06XViCw8cSVwsFvjnRNeGxg8HytaoNNzcQQ2PiYeavNCr8pWicSGDD0XB0HczXXknNfwWobzryECelZzeHnSInbvz",
"expected_output": "Expected output 1: wjzBZwT3CTzH2XSxOvGPFy2gZrjEr3",
"explanation": "Explanation 1: 8jp... |
HTB-9939 | Penetration Testing Module 9939 | Fundamental | [
"Reverse Engineering",
"Networking",
"Scripting"
] | [
"Objective 1: aTcC32vwfYSiqqBpx2vi",
"Objective 2: JxCJVLvYLsH8OkT7hUtd",
"Objective 3: OQ47EGyHQtL6BC7CBHDP",
"Objective 4: NpYhzswmnZEzyIvC1XUj",
"Objective 5: bJP38lVUsFLLejVXP3Bk"
] | {
"os": "Ubuntu 20.04",
"tools": [
"hydra",
"nmap",
"metasploit",
"netcat",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: OmleV7exZHPTAFvQq4JfyNlNrd5sWPtXOkt6fncjaF67j4fi4zpPVjcevcMtHNKUzSxtuhuO5NA7KKkiRlJl5RfCMb3b8M8PG13C1cA1kn2p8Hb59eMIsfwJoHKmtoiY13oOmG1LFJjyCi1Nu2mH53",
"expected_output": "Expected output 1: 5aRnAvhX8zA1rZQLgH01GxhDFnmrYo",
"explanation": "Explanation 1: PV0... |
HTB-9940 | Penetration Testing Module 9940 | Intermediate | [
"Privilege Escalation",
"Web",
"Scripting"
] | [
"Objective 1: l7TiYYQn8LHQ76hHLie4",
"Objective 2: YAjd35x5t6qFxpZ6fnIs",
"Objective 3: 369lHYXySp6tfZQlAwlD",
"Objective 4: kkLu3uZ6JwZZBPmIrWba",
"Objective 5: s7pGY5S77f96BQiDVJ70"
] | {
"os": "Windows Server 2019",
"tools": [
"nikto",
"metasploit",
"gobuster",
"hydra",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: tRi7YoWa2cuA3GYsZd0ts8CywA8Rl8h9SrmrRcLy78tcNqSvNGITYie3OHdW4DzmJDuOj2mhpLtsVCrM6dXzCuq6SKN4jUV87ietsDketJrVAQjEZbnPwW80BrQbkAlidArTzyXQeHgHt2BRd1rVrb",
"expected_output": "Expected output 1: uzh9jLn9nAayEw3AsKLrdyqCE3Bb4i",
"explanation": "Explanation 1: lbe... |
HTB-9941 | Penetration Testing Module 9941 | Advanced | [
"Linux",
"Reverse Engineering",
"Windows"
] | [
"Objective 1: uv1KtdHl3bU0xsdLETp5",
"Objective 2: 1DrbPtsNFD4XeuWjDdNI",
"Objective 3: nxMfCvsNCQT7x3ZfT80W",
"Objective 4: vtAuOBe5AC2HMpJpujau",
"Objective 5: 91BCtiZg6rQ7EqaeMxZO"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"netcat",
"sqlmap",
"burpsuite",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: EYPM3b4ipquaCgINDMhjXFcWwSs7Uggx9w4X9ygsfMfOm3KUECYKezRqiqNAoNTLIDuFGnTkVBumUeLophmhx29veFJaLX6BjjJwgnG9hbtvyAqzeHn4V54K0Pv9AEQ30YdVAKBIJxcp8EtG2euFdK",
"expected_output": "Expected output 1: PkmtlvlpxzQBE6ehLdouFkJmT4Frnx",
"explanation": "Explanation 1: fWW... |
HTB-9942 | Penetration Testing Module 9942 | Fundamental | [
"Windows",
"Enumeration",
"Linux"
] | [
"Objective 1: 6rUBTRtOpOAZ46W9gQjQ",
"Objective 2: 0hHGI31lA51abwVTaJv3",
"Objective 3: nL0M2IkmiDDTHF85BtjX",
"Objective 4: NZnJ5x1F5xRUUoyCSbEU",
"Objective 5: tHzfTix7wRmiMVvspN4y"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"netcat",
"john",
"nmap",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 1nsXzhovry9MGeVw2BV7s1HtgaN0iyj05fK272sEFLD2D96OFsYptUT2w64CmUHGKcbFViN9xbQpokCqePiczg7ypdmHZdZBv6vSx781hlaShsJeaBekYAUbhLSHyiCKcvkBDBSoz9EBLqF7qBpp98",
"expected_output": "Expected output 1: 0dEm3CC0FkWuccaiYESOXJC7LXz30U",
"explanation": "Explanation 1: KaF... |
HTB-9943 | Penetration Testing Module 9943 | Fundamental | [
"Linux",
"Windows",
"Enumeration"
] | [
"Objective 1: EGniJmI8kecuc4dxLb2N",
"Objective 2: 19FvHXu3801FLfj6enLx",
"Objective 3: YOjgILi2jM0mghmnBZyX",
"Objective 4: ThzTIFovUMO0ZBuMdgYY",
"Objective 5: DkIyzqeyHzhbxUt855DK"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"hydra",
"nmap",
"netcat",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: JnvxASeyqFnfSgyzH5fGDGLXNRg5xnsOtdaQreM8rF8gZyLGUaXdYJH3kvxgx2F01C5AtclbncHcyhLMl4zWcE6iMWlOTJedqDiVDYyoEsghVvhLKldKcl4F8SjUXPktxMVLRvzIBF3cjnznmfKp2f",
"expected_output": "Expected output 1: rxad2kRYffcKxdzXv1PLVLDUE6Yzq3",
"explanation": "Explanation 1: vmq... |
HTB-9944 | Penetration Testing Module 9944 | Advanced | [
"Privilege Escalation",
"Web",
"Scripting"
] | [
"Objective 1: jRmnAhnN055Uy6lsSy7L",
"Objective 2: aYHib8Gg98dK59qSq5fA",
"Objective 3: Vzpbdkf63vxtoS85kD3E",
"Objective 4: 6NsSPPMABNS7OBkrhh9T",
"Objective 5: 6JlV7imbbaTGSvDfZ5Dj"
] | {
"os": "Kali Linux",
"tools": [
"john",
"nmap",
"sqlmap",
"metasploit",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Jg18uFQ28XnAa47zfayfz6NBbUx7NIW4ttaFqEWO8J1UVp4LPDiiog4DnleaWcUKNNsd2IeM7aKMhfqdaO2fsMGR6cIwk6Bvf1aDQxVwPSMI3NKVK9UWV2YbO1t5iCAChuQgCo3h9MwAIjepcCbBlw",
"expected_output": "Expected output 1: q8HBQdIRyQt3lMaYYJhQz2HB30Tm6b",
"explanation": "Explanation 1: lcy... |
HTB-9945 | Penetration Testing Module 9945 | Intermediate | [
"Exploitation",
"Networking",
"Scripting"
] | [
"Objective 1: rMIvMmklEYvigzdaG6lb",
"Objective 2: VDiOsGC9j3Wj0QkoujQw",
"Objective 3: buIzuw8cEIkdjkujCvhQ",
"Objective 4: vFvL9hJtJ12iIiFAH6HF",
"Objective 5: AuUmoaZ7x4J7sTYoMLzJ"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"netcat",
"wireshark",
"sqlmap",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: AddWnPiUe3SSqYxEwYMQDD8an80QXMnMmiMarssf9RuKOQroMMecYPZu0WZS118KZ9uyCoPap6s1Zj0w3OGI73BEvEnekMzVtCZL3kNeZ1B0wyhmfqvjrhscBrM88CnVyp3NFARdhjtFAiF6uh2us6",
"expected_output": "Expected output 1: Z2MmIS9Zg1TkRdWeSOvYRYKDFx7u9s",
"explanation": "Explanation 1: PCf... |
HTB-9946 | Penetration Testing Module 9946 | Intermediate | [
"Windows",
"Exploitation",
"Networking"
] | [
"Objective 1: exmvRPfBovvc4pR6FJi1",
"Objective 2: BzyMygOBJU9TGyqPFSwX",
"Objective 3: WgS6OlyH31jFewUVmvQS",
"Objective 4: xa17NpbJoeHRfwMTdFd2",
"Objective 5: 5juYJ49OAmdeTTE6uqmW"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"sqlmap",
"burpsuite",
"nmap",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: doOK8vhxpTZ2LTLiaBdTc7ol8r2zASSJLIQooqrizDt0WqzAXiRTURjBLKuG4CtjsiBoxJIf7G1EkLrqRaye21I9wptABjLEvqzEg4FTLKeG44Id2FW8pXNjb4b7K5YDXy5vc8IVcOdBszU0ETzXqT",
"expected_output": "Expected output 1: upZLaE3uIDKdz76E4PsRu4wIDm4ojH",
"explanation": "Explanation 1: fr2... |
HTB-9947 | Penetration Testing Module 9947 | Fundamental | [
"Windows",
"Enumeration",
"Exploitation"
] | [
"Objective 1: ypYPpqabgqtGtSrEKZG0",
"Objective 2: SAPlXJQtegoRFIOe2AFT",
"Objective 3: Bb8Uk2l7od5HcXINSSss",
"Objective 4: UQXJzzNt5xZ5AxPcI3a9",
"Objective 5: gwUmVrBuaVBndHpkwWOQ"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"nmap",
"netcat",
"nikto",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: j1Cf0cEyaVRfEyYdpMEPBMdJhtM6OxTeQ099VxcflxcHLveXrg6XL5u34O15ICXuLY6q3r0e5flzw5y0jtcJiBaBfY6gD0xXIuQc7PluAmP2GnIOxmTR70V3vBEUKJityQl4s1ATDuCILnQL3z7GTI",
"expected_output": "Expected output 1: Ms3bGDSzMo1iKPzXZBDR6viybQVqxB",
"explanation": "Explanation 1: Dn4... |
HTB-9948 | Penetration Testing Module 9948 | Fundamental | [
"Exploitation",
"Networking",
"Windows"
] | [
"Objective 1: C2aKqaPPsHREJD7c5zZ4",
"Objective 2: GhnUT4VudaKzvYyje0F1",
"Objective 3: l94Q8Z3x9FDuP7kviBft",
"Objective 4: qmx5I4mXlw9sf10qHXiC",
"Objective 5: cggPSNZjpNj9Ta5mLNtM"
] | {
"os": "Kali Linux",
"tools": [
"wireshark",
"gobuster",
"netcat",
"sqlmap",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: gPS1uG19rarMZnuYSBHgsvHueKJ9fgamKBLfVxtceXxn7IAb6owmEHrEiJXZKPdAHIBdCeHJDwirX0aKRAsF5F3NdVQqj6p2fLCKU5vZ7MPt6PxwcySHzWnksZbuY318chLw7JJhPJYRlS26UJL1Vj",
"expected_output": "Expected output 1: CE1anmmcV7JHxizQTUBvIiuAD2dbOb",
"explanation": "Explanation 1: q0v... |
HTB-9949 | Penetration Testing Module 9949 | Fundamental | [
"Linux",
"Privilege Escalation",
"Windows"
] | [
"Objective 1: 7b9AUQXg7YewGAzNjlSG",
"Objective 2: FWGHBIsJTfSuv3j1Gay6",
"Objective 3: e5J7I6xrQ8XpPrjCPisL",
"Objective 4: 0g8XCk6ukxBuBH5OAoSH",
"Objective 5: 2smX6q2NFvuaFGB21b1R"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"nikto",
"sqlmap",
"burpsuite",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Wcn3JFgOC9I3e2dLYJ11q1OEFn9dmQnL5w9WVmRx4efM2CnTqCtZUxmnt8Awk3D7bfAddyphM7XiGvPfDYguC6OKleZ6jPXl1vl8rKU9xOAaeVgTZqwmV7F8sV8MsaJZ3xcrMFLZsVRuMDIJaTfvF3",
"expected_output": "Expected output 1: mc2z8dtcwWw34RUJFVUoBxGjiSMDvF",
"explanation": "Explanation 1: g5C... |
HTB-9950 | Penetration Testing Module 9950 | Fundamental | [
"Privilege Escalation",
"Windows",
"Reverse Engineering"
] | [
"Objective 1: zoWmXc2X03PNFzxPmkFS",
"Objective 2: JqHko0PbNVthIvVvoTIa",
"Objective 3: LoftUob6v4Cy0hw71o4q",
"Objective 4: gnZVTghtyCLoav0CgYVq",
"Objective 5: xGD4DTtGZhR6QHeof0g1"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"john",
"netcat",
"metasploit",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: t8lnf6fq1GkyloZnjbmXqpOgCEM0abKxS7VOC3xqhN9NpVauR7RwpqQpBsPpmJM19Cgxq9jlBUc8RSc7F7AdzmMU4w5ZXhyWmbCMoycyFlEsOuW7r7m8L9HDCTNmrsW6Hkae6dEELp8d7g2M3S0MnC",
"expected_output": "Expected output 1: zHEkgT90Sv7xI5tUNNRZQg9gXiLPST",
"explanation": "Explanation 1: uhx... |
HTB-9951 | Penetration Testing Module 9951 | Advanced | [
"Reverse Engineering",
"Scripting",
"Networking"
] | [
"Objective 1: CI4FwMuv5s0nUpTzjPbq",
"Objective 2: orWPk8eKvVTA61ETOIbh",
"Objective 3: fnrExtX3HfsaLCkm8T6Z",
"Objective 4: CcoGk3O6wI0ftRXJJUnT",
"Objective 5: MgHcMuAdgj611GvwQTZO"
] | {
"os": "Kali Linux",
"tools": [
"hydra",
"gobuster",
"netcat",
"burpsuite",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Axsg7QUXUxbwPfLxlP8WiRnwdZMhh1H4MaAHTxuOSIVzrqjZtj3KvzYnv9jewWhCtFU46H2Ng2vfU01kZ2lfe0w6BYWhf6TQxaB6WSKdyipoViRWeIQmYbXaub7pzxyz4mLDs6ntuNRWRTGpzeNBxp",
"expected_output": "Expected output 1: VQOMqR03IYvDaS5N86whnVl4nZWx81",
"explanation": "Explanation 1: z8d... |
HTB-9952 | Penetration Testing Module 9952 | Intermediate | [
"Windows",
"Exploitation",
"Web"
] | [
"Objective 1: 8gkPvZJxWf5hjxRdu9Vq",
"Objective 2: 3SUL2wCZ21kYRI9fYaGi",
"Objective 3: swBGcSypWwn3x313I6gr",
"Objective 4: HVT4sC8qKmJYPxHBHuof",
"Objective 5: hMA1VkQgS4MeBW3DwDDj"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"burpsuite",
"gobuster",
"sqlmap",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 5ISKRmuGXTA5G15IFuAtvHiEN0doSb9QmZhXjZxoGjveNbhklisjSAnQmnJE2LahvEbljsKDmDqSBtSUISoJ6JEsN9zp1XPASBjkaG28kyj1KhZTePuu923K8uuL1vJ3L8q5ZE3SjvpZb97NALJDjk",
"expected_output": "Expected output 1: 10Iny2mWjExGBK8MYmDNMHhZ7h0DDl",
"explanation": "Explanation 1: Vz6... |
HTB-9953 | Penetration Testing Module 9953 | Advanced | [
"Scripting",
"Windows",
"Enumeration"
] | [
"Objective 1: pyO62Fkef7OqHa4bBQGD",
"Objective 2: se45HxRsLiOjGgYqAn7f",
"Objective 3: ATGqYmApqWhrMvUqo1ry",
"Objective 4: bVGYYsRJIbBXiQE9LRqW",
"Objective 5: Iy7QSvk8b8OA3RxDSlVG"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"nikto",
"burpsuite",
"john",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: eevqCN9luqD4mcZj2gmkzyLu9OhqfK1wgclI6pifB4JF2coTpTaU1KlxVXIy08UGUVIJKy4d8mu8TC5LG0YQtwwl50yMBSX3IsHQVTUGBwpAC9qKYcXTI7bBsyYoKsKTTWC2WMsghS9nIO8mo5Mibk",
"expected_output": "Expected output 1: y6FN5655T4wZgYBF4g9vKrS0SFF1SK",
"explanation": "Explanation 1: XDp... |
HTB-9954 | Penetration Testing Module 9954 | Intermediate | [
"Windows",
"Privilege Escalation",
"Web"
] | [
"Objective 1: 38lHGf359nqdnYVGB3Jb",
"Objective 2: EHLwF61o9APwqyw8JNj9",
"Objective 3: Zz9iSmAoH3uaql6PipG1",
"Objective 4: KIvm78SmAgHTb9qrMFLE",
"Objective 5: LSOrOnZaOFpq7y3CYuZy"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"wireshark",
"hydra",
"nmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: nauAeRkeSAUtKfqUemxbrAlnV6dX3iKFJXrXe4j8eeV7wEDlCZFOtUuskLUKjvomS1OoWMG3rB7JRrGsqEOPgMBHkRTOqo3c87Lcl9PJrL2feC9T90RNS3bxNJ7t8jfPgiM04qhWP8UvYZWzXVcKeX",
"expected_output": "Expected output 1: 6V16UHUyPu6rsm4M02fBqOqaTltBRR",
"explanation": "Explanation 1: qnk... |
HTB-9955 | Penetration Testing Module 9955 | Advanced | [
"Reverse Engineering",
"Privilege Escalation",
"Scripting"
] | [
"Objective 1: ovuszspLE9IZyNaT4YdZ",
"Objective 2: Q341CxbapdHNq8RzQDzX",
"Objective 3: xN4p684qqcMvs33vwIKL",
"Objective 4: KxOafpvBjR579cYrK6eK",
"Objective 5: WhKbopmHTbUuMbTJXGrP"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"nikto",
"metasploit",
"john",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: l6thlMW0KrCtIGqyhwEN9j3I8x2T18o0ZTRwEbQS3HGfjSm3IfQwhxFm8XmxE5T1v5IZ2XMJANu4PlfPynvnYvCM6dwAHDmjWg1WFseVNuDF2AWhqSnECy62LEUKuLr8DjhCCeLFGp6sx7tTSu7c9R",
"expected_output": "Expected output 1: 1aksSflfPa2oKgtRJGuZtJjmS4YRg9",
"explanation": "Explanation 1: XhA... |
HTB-9956 | Penetration Testing Module 9956 | Fundamental | [
"Privilege Escalation",
"Reverse Engineering",
"Windows"
] | [
"Objective 1: eXkgnuXy2QYPR01n69kD",
"Objective 2: BEzLx9ttHfZBQZJqb308",
"Objective 3: jnE4iLqVsuPYQb7gBLt7",
"Objective 4: 9ZsAelJR7K15KWuPT6fc",
"Objective 5: 2KN0d2lkjGYHYqS9Ymr6"
] | {
"os": "Windows Server 2019",
"tools": [
"nmap",
"wireshark",
"hydra",
"john",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: omdxhsJQtX7lEU9SiWmCIYWFllzFWhnBvCLYwpixiDNMABJUCOR6FXxPD4cNPSUL7niH306IAYbmJqF4NFAff1W41eETq9ldJoOEfIiohHyml9IX3BfGctFBsMyVyISlQ3ZvooFRnZjBJGCNGLyITt",
"expected_output": "Expected output 1: D8zUs9DMtMi2OLhQTgnL1onNgKV82Y",
"explanation": "Explanation 1: CId... |
HTB-9957 | Penetration Testing Module 9957 | Fundamental | [
"Scripting",
"Linux",
"Web"
] | [
"Objective 1: GzKAYBOB4hURthBZgj98",
"Objective 2: eTwKga7uq85MxvdEQY6A",
"Objective 3: 8sovm8tfhNLoBYBtbS7v",
"Objective 4: v8YWrOSbadn8fOiF1RtW",
"Objective 5: VrzGnRtuHErdcGgVJ5Nv"
] | {
"os": "Windows Server 2019",
"tools": [
"john",
"netcat",
"burpsuite",
"nikto",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: MavMQKxh1rZXuBZTPxCfP9d415EUiKM42SY7RGgY3WEk7wXJZFC8AmqrGZrvDALc1ffefNMJob9NESORA8HvOTXZLafnLj6xf3ABg6qrSab3hsa7veT8lYXaKImKSHMAtQ0nrN7ChZiQSdj4vQpPj7",
"expected_output": "Expected output 1: KiQxL7E2RDl3BT6LgjAkZYyMqmnyVv",
"explanation": "Explanation 1: PL9... |
HTB-9958 | Penetration Testing Module 9958 | Advanced | [
"Exploitation",
"Scripting",
"Reverse Engineering"
] | [
"Objective 1: aVcdf0mT9D1EPvDcjuM4",
"Objective 2: tOY8EYHVMz7uBj9CP7qg",
"Objective 3: c72SdEiGq3bPc3VLa0i1",
"Objective 4: I1iWl8zxeFqewjrkfOmb",
"Objective 5: coC6Gk3sZ3reQ1iS42SH"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"nikto",
"netcat",
"metasploit",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: qwF4oZnTTVdclZxj0lHVFUmQALtjWarjE8vgtcRro1qFgI7Sc3TNPVd8AIcXi8Z8pAVqdN7VXVdRREM6v8sPHoMd7lNq8nDhO8UrfUPw4681H9UjNWWpIK8sz8XsiQCwgrIzUJHoeOVUaUV29ZuPgH",
"expected_output": "Expected output 1: TQ7kTWeZaZKbPlTzNYTX6MkaJA7SyN",
"explanation": "Explanation 1: mGJ... |
HTB-9959 | Penetration Testing Module 9959 | Intermediate | [
"Networking",
"Reverse Engineering",
"Scripting"
] | [
"Objective 1: zdAzSR3ZXWMAXKeNPPZ2",
"Objective 2: ybQVc0VfBOhFrW6urCFs",
"Objective 3: h6fZrIp6nTcozAhUNZRJ",
"Objective 4: 4r1S7jeQjRsBCNg4FOC3",
"Objective 5: Rb7xK0jx1dQnFmrkpoXT"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"burpsuite",
"hydra",
"metasploit",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: NhDuAR9QNNaAjfAWvLpds1jkEiFNBOwAScNumZYshhijFfECRngZnLiShUTdk4JLsk4p3LML2y7KwLDXpSwTr6QMERG0FUtrbubOsNIELK1lAJEkAaWMA7HjPKZaN1PX1jNQ3Tv2tToZRBgiCFLI0u",
"expected_output": "Expected output 1: J14DPFKCJBrfN9vvmd6gJyYftltDQb",
"explanation": "Explanation 1: WRV... |
HTB-9960 | Penetration Testing Module 9960 | Advanced | [
"Web",
"Windows",
"Privilege Escalation"
] | [
"Objective 1: 66klc0Y5eXogDOTlxb8q",
"Objective 2: 3RMGANZUkfsUxfdLMots",
"Objective 3: N9Vy3hajOqPsLlIDDr8l",
"Objective 4: EUBVOnozs58yCHa2KR2F",
"Objective 5: oeNEcskQy9V4LVE2AHzy"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"nikto",
"john",
"sqlmap",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: lVQ53c6KW8LpNlz41guLDVk89skRVi2y7k6gI50LchJqIcJ5Jde4p3VXUQMX2VriUV83f3UBI9uVjIVeLwJa08kyHUzSZoNC7RjsnRcLXzeMKwqWZj4xkhsT3DCpbiYjqO1JvJfYbQYgzO9MIG7JOD",
"expected_output": "Expected output 1: BT6PZfoMCpKumGZ18OhhR4mOnKTAE9",
"explanation": "Explanation 1: SQh... |
HTB-9961 | Penetration Testing Module 9961 | Intermediate | [
"Web",
"Scripting",
"Windows"
] | [
"Objective 1: JQxQ3aSgLUPBCsXNPhJN",
"Objective 2: eLOi2PZpmSAJyfGIYPuQ",
"Objective 3: YFBhMsuHDohvrutE6MsN",
"Objective 4: YYqL0Go0y5Jfao5vbf3g",
"Objective 5: 6drplv5hptE89I3k8pu6"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"john",
"netcat",
"sqlmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: v3tY3iPq1aWNAC41CSr02kigix2RXOsVaSrWroOjb83ajgtw1M1Z0texOm5zT3jFI709bOdDsdRdEPYnhyuHsMdRpifN7mdmFZpVuLG8wE3iZZt8oVWVqFul2V4oEVF1dBU2yDFttmQwt7VoK4bcYG",
"expected_output": "Expected output 1: VmXQfnzZ4lKg2qIAkYTKRUAo6mnsa3",
"explanation": "Explanation 1: wTf... |
HTB-9962 | Penetration Testing Module 9962 | Fundamental | [
"Windows",
"Linux",
"Scripting"
] | [
"Objective 1: a7sHmm8eRN6R1shXB6SA",
"Objective 2: gPjjHIi1F2o7GItFlQtL",
"Objective 3: 2P0MctDCJmt73T7v9jpQ",
"Objective 4: TFXp1QHRm2TPhqIla204",
"Objective 5: m2PdG503bWlCJQbKPl2W"
] | {
"os": "Kali Linux",
"tools": [
"sqlmap",
"hydra",
"netcat",
"metasploit",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 43loeF0sylvE5fyCuHPDS4JFa00MkGKq92aKvKJMjlIReeYd3A8s5X3HcaZGs81nZJd84T0BUo0PiIbRbGa11pGvZL6TlmsvMnUjAdMg0qlvBmJFZUdIfSMjQDRCKc5rA4mtv9Qle3VoqsFpWA7L6L",
"expected_output": "Expected output 1: QR5psUBoiGsNTvSQBxaYG3hxFppDWs",
"explanation": "Explanation 1: PSW... |
HTB-9963 | Penetration Testing Module 9963 | Fundamental | [
"Privilege Escalation",
"Enumeration",
"Networking"
] | [
"Objective 1: 3SQ8nKyko9QNfrc75oyH",
"Objective 2: OcrMPEfYJ5btMbojy19N",
"Objective 3: NQGVEcOHCznXUSItur9N",
"Objective 4: CkOa4HR1WvfrSRawF4jk",
"Objective 5: Cih2oTZRm68QbVeDRF0P"
] | {
"os": "Windows Server 2019",
"tools": [
"hydra",
"burpsuite",
"nmap",
"metasploit",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: yq4P9q5qmbVmkA2clKKh84vfum1mDD5l4EBBqDDXjB9TiXTs8e4GwUGrd4Nc9Hj0z4i3LlxwZGRYHo39omR2UXJ2iEPsOoiJGOpuSfUv28yRwAxPkyo9goFTz8muCXRelr2U2CgBzw4vGDw4Vk7jNZ",
"expected_output": "Expected output 1: RiROG0GGdV79erfAxXb91gIwg1Joym",
"explanation": "Explanation 1: oww... |
HTB-9964 | Penetration Testing Module 9964 | Advanced | [
"Reverse Engineering",
"Windows",
"Linux"
] | [
"Objective 1: 8Kh3WK4eBrip351YVGCn",
"Objective 2: WozIM3G0AKHYwTcI8yC9",
"Objective 3: 7sdWJDWvNKpuKH8gyg0z",
"Objective 4: DXKo1AKbe5csGP3Ueqin",
"Objective 5: WXTVgG7ejPYcoZ6V9r1W"
] | {
"os": "Windows Server 2019",
"tools": [
"hydra",
"netcat",
"nmap",
"gobuster",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: EYQtvrfHPKUV1HazE47D5EXnZuFVu7DAsTAodRFIMN0MHbAc3b2YKohLhgnXhD2IESEjJK2n8RFN4Uv5ktCeoQjpEFwS1oxLP0BOQFKXg27Ss4Fa7h3NF4NkOT6gdTgqWW0V3qAm5WlZBv7IJxlX1Y",
"expected_output": "Expected output 1: GeDBNzxY8XG0VwNY4gYWdNubnqFuod",
"explanation": "Explanation 1: xHR... |
HTB-9965 | Penetration Testing Module 9965 | Intermediate | [
"Linux",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: ghyl6up4rYZjxwNM748u",
"Objective 2: BYtwo3vp4hgFKttf2Xny",
"Objective 3: HRHdH7XDA9AfCIyrp0ok",
"Objective 4: X4jtSCTDQKkn5UAzaOfV",
"Objective 5: zpIPU3IENnFjZQr93Ph4"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"john",
"burpsuite",
"sqlmap",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: fEdoCJYJqGYvLMjfoLkwZqwazKEEqaz5VtoFSr2Yoq8FEMitduNvf8dvTs6YC8qwvkW0q0wzC0csoqutm9VAKqRlovoPOyRl0BLnj30srnnAjHe81UQzofd9STgaZLP9Ivs6BrwSssyKOZfTEncigH",
"expected_output": "Expected output 1: P8UNWuDyo46rTSQT7610FfgME8XXZ2",
"explanation": "Explanation 1: ZJU... |
HTB-9966 | Penetration Testing Module 9966 | Intermediate | [
"Web",
"Enumeration",
"Networking"
] | [
"Objective 1: yg33R9TQS9wwwSp525Yn",
"Objective 2: 9EGRlnqSAVfTXk1DQByP",
"Objective 3: O05FgwsNKrCZDlKG5m9j",
"Objective 4: QHOihwytZ8E9rKGuqmV5",
"Objective 5: 6NCWDQVxR9qrgZacCCf6"
] | {
"os": "Kali Linux",
"tools": [
"wireshark",
"nikto",
"metasploit",
"netcat",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: SIOBw5toIbwwAde4vyo3flaAVk77RmwuW5WAjHKsEOC5YHBymmm0hh2jNO5X7Ysfg97vKhtYpNU0AoQkWujt0ZRtWoXAq0sQyRqS6JXOmSiTwWW48iE8LgDJKJxXvXEOwiiPWBllawpi7aTrrDbtmD",
"expected_output": "Expected output 1: FRXkrvG4YB6zwcuOxUMcqoDbTuDsXZ",
"explanation": "Explanation 1: UlF... |
HTB-9967 | Penetration Testing Module 9967 | Advanced | [
"Enumeration",
"Privilege Escalation",
"Linux"
] | [
"Objective 1: sEi3nwALPfmmqmBGs2F0",
"Objective 2: 8sTdWIKacnWZGAH1aKpF",
"Objective 3: QYZmvEUotTvJjRSGZN7z",
"Objective 4: SaYNJdNlsBRGzbE9L61e",
"Objective 5: osXjRw7WofO6a0rynaBN"
] | {
"os": "Windows Server 2019",
"tools": [
"metasploit",
"hydra",
"sqlmap",
"netcat",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: S3UOoZKKZdrT6T9ZVSLpeaUm4KyzHnhPMcA6ABcdihNxk5SLOK5u80jHWSrlfUQ4AUOpqhtfWpGqdZIRHiSxsKfLkgw3Lki6MW8h3kYz3rzWHH7JyP7IfmyOOafxbmQkqEDSMdSKgPAwTYOXYdOSdC",
"expected_output": "Expected output 1: OJy0YSVxJq0xtekrKuHkubNwzSkkqt",
"explanation": "Explanation 1: jIm... |
HTB-9968 | Penetration Testing Module 9968 | Intermediate | [
"Scripting",
"Linux",
"Exploitation"
] | [
"Objective 1: 5cFrwX6RpAH5kRDVN4kZ",
"Objective 2: bGGOd94hTsFVDVoqshsj",
"Objective 3: UwIeZJFLSeOBTtKtNu97",
"Objective 4: usX3ALiSSoZFOcxxY8Qi",
"Objective 5: kAnpwytIZf9ePt7tZtLl"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"burpsuite",
"hydra",
"nikto",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: TiYSzVMqEnSUhjOhCH41e5fg0kdKuszrfwMYTZZwF1Lvqgx0fa6ZNFkQtuydDzsXlfFUYujP2Y17Gi3ZAZfv6EMt8LmV1pAMjOIg0ihbAqRjD40S1DUAGnHz0bcEQ9OenDydZgQ14TU9RZosdvNZLq",
"expected_output": "Expected output 1: 8Ip2FZ1Il8rEGLRccVEO7HAtRCodYu",
"explanation": "Explanation 1: upC... |
HTB-9969 | Penetration Testing Module 9969 | Fundamental | [
"Reverse Engineering",
"Windows",
"Exploitation"
] | [
"Objective 1: XYSSEUIHnlx8pA1GsO74",
"Objective 2: e8ado0TBhFYOtiBfvJNP",
"Objective 3: CZnxbPknBgS2YiqnWuMO",
"Objective 4: zM1tYSMPBKzP2LV2I4ws",
"Objective 5: xmKisu4HwBuzKt1n4e6J"
] | {
"os": "Ubuntu 20.04",
"tools": [
"burpsuite",
"nmap",
"metasploit",
"nikto",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: qBsG1u6hquHef1pVc1wj6NSTqqLvhCvC6JeSm7CiA2lUJi1PdyuxIS6MkWdTueex8GJLFwjwu4YuRSWoDhTeXa8rJ3oPCo9xsf8jm3DEwMaLK3qDZlX99jlEpWnRJDqgtr0d2SR6a1Y9JWV7pJeP2a",
"expected_output": "Expected output 1: qM9OApfbXPa8roFJALGWfWGcTwE24Q",
"explanation": "Explanation 1: hyI... |
HTB-9970 | Penetration Testing Module 9970 | Advanced | [
"Networking",
"Scripting",
"Exploitation"
] | [
"Objective 1: JLxz6WTa0pP3eksUfOmf",
"Objective 2: 8iSPocVXg0xWGT2WtOD0",
"Objective 3: olit9sA577z0ggTpqpnu",
"Objective 4: CE3tT78hRohqQwm1gNHP",
"Objective 5: cmBi25w3YGNBYjIqJDm9"
] | {
"os": "Kali Linux",
"tools": [
"john",
"sqlmap",
"hydra",
"gobuster",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: vir3PBJ6jJiYiT9lXkb9VwAWSCBd4gVocFXV4FbCL7qYdlOlOTTpzKqf5dYC60XJcL9uG84ydbrS8Nfa5jWyn5qUyv1uyzarYHpgczruHLHaEhx8xDzIDaYZ9WemRanE5IOIvY0lxz0dXm23WQ9akO",
"expected_output": "Expected output 1: 4Zy4b8nFU6YzNDiblFTwpWAwDMwR8R",
"explanation": "Explanation 1: Z2v... |
HTB-9971 | Penetration Testing Module 9971 | Fundamental | [
"Privilege Escalation",
"Scripting",
"Reverse Engineering"
] | [
"Objective 1: y7KQwiaiOTWnqCa7YMHO",
"Objective 2: 8mxZfL5Tkohcd2pqKpGZ",
"Objective 3: t76aPdCtwKhr0t2zAj0A",
"Objective 4: Lq0yhHxQaLFCxfcWcmPF",
"Objective 5: sasZHLCFxGTK2wP6fhB7"
] | {
"os": "Windows Server 2019",
"tools": [
"hydra",
"sqlmap",
"wireshark",
"metasploit",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: RAZDwLMrTGIuDITYaE2615RM0qM3NiX8S2S60Dbwl92JWbUMVnZ8iApVRRddQUjGQbgN0nYkxUlorTlw0LaxYAXgBEqXWaPV5O0wqjMhXqYRe7zn6SZ9XdbiIL3PfxhuoroUlgKXwvku3VE8Kf3onz",
"expected_output": "Expected output 1: aP9eLqK5PNTykEh3v5zdxiA5O0p9jR",
"explanation": "Explanation 1: g4M... |
HTB-9972 | Penetration Testing Module 9972 | Intermediate | [
"Linux",
"Scripting",
"Networking"
] | [
"Objective 1: giSxbkwHAVKOQOuTYOL0",
"Objective 2: 0JfVGneG7z2sZgfJd3af",
"Objective 3: pb8gspGwOO1mfgWUBOSB",
"Objective 4: j9RpEBWL803gTF0mxZXK",
"Objective 5: 5JR5WhIqxEbfmJnTth0A"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"burpsuite",
"nmap",
"nikto",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 8RFqWBjL6CZ1MzqDhz1haDb8PQu7mj0LWLXCDgQoW03mHlPAlsHtM62nBYbuA3twqwcgqDHnl6uztsgxCTVGrvh5C9KuXtV6XjxhgEUwMY3kksfZl2YVgzG8dtlFG7RedT7Hs3hprpJ7WD9dzdQL8G",
"expected_output": "Expected output 1: GTZaRUv5l6cUR2W66APmas49eLmek0",
"explanation": "Explanation 1: lAu... |
HTB-9973 | Penetration Testing Module 9973 | Intermediate | [
"Privilege Escalation",
"Reverse Engineering",
"Web"
] | [
"Objective 1: nM0Zt8VeUvgclygDHW7h",
"Objective 2: 8zt8DkuZXXHJzmhQF2p2",
"Objective 3: qMBtQhVlimRU0ZpjxcNJ",
"Objective 4: nri1nswtc5ESFcdNbz5q",
"Objective 5: 9MfLdduatCkSDcDBNNNf"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"hydra",
"john",
"wireshark",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 4f78i0I1RvFdSeZSxf238Dn2CLOHpzPzr6nVHPbR0pbM7mcf3Maaovis1LXcwPj0CufgO7Ig4dgvzIXUs7XG2yJBVQ3NXe7tuTw1CeVI9BaJz53QiL0YQVUWpBG3zZFyZbLH238LHLPS0LrPaTkiAt",
"expected_output": "Expected output 1: 6Bl47oofcK3gH2txbK46WkrqMDJytX",
"explanation": "Explanation 1: LH8... |
HTB-9974 | Penetration Testing Module 9974 | Fundamental | [
"Enumeration",
"Privilege Escalation",
"Scripting"
] | [
"Objective 1: WvEvRJ9dMm7AzKjyqlRN",
"Objective 2: pCZklFxDpizDEeGMp63u",
"Objective 3: nqkFeULtnRNhR0BIiLvL",
"Objective 4: DY5Pl7cDeZW0ndUjpKQ5",
"Objective 5: cAVOzTRXHv68Zs8nEdL9"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"burpsuite",
"john",
"nikto",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 55t4e7yuEHuAwCC537weNLuG3pVn9SlWy9bcFWs6t5OSZPuE8qCtAqVK6oAJ8UOMEnpolYeKwZe8UMFGBXU4iNiMDkKj46UZ74sTJu0BTglJsbsZiSfZB20CfzFzdt3G3P3KqcgLAjRvMV8DmHxwkJ",
"expected_output": "Expected output 1: Pg9aTmR0r1yqkAnbFIjmG8bgYcdIbv",
"explanation": "Explanation 1: Qnr... |
HTB-9975 | Penetration Testing Module 9975 | Intermediate | [
"Reverse Engineering",
"Windows",
"Linux"
] | [
"Objective 1: Z3zISgamtQrStOy586N1",
"Objective 2: 7Qjyb5MS0wIsCQHmgAie",
"Objective 3: YA2m8UNz1tGtvB7Hhaxk",
"Objective 4: 4lLHbevoUFNdO7jraOxE",
"Objective 5: tXJTotZfi5gFeTv9KP0A"
] | {
"os": "Windows Server 2019",
"tools": [
"nmap",
"gobuster",
"nikto",
"sqlmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: IanMpk89UCmyO9IdClAO8syPtWHU5MjbWBWodmRUeutCy4R0kOgyHcciKwGv7bDuoiDKm3FokjDvT0Xs74pr4lJOTR5VbBjqmwmH4AsI9TuhFDzQkMQXsLigMlsYsVAPEVEJHExKu6id1vFDyEHICr",
"expected_output": "Expected output 1: W36RdmpVC1miywW8OMKane5cfqePCd",
"explanation": "Explanation 1: 2ml... |
HTB-9976 | Penetration Testing Module 9976 | Fundamental | [
"Networking",
"Scripting",
"Web"
] | [
"Objective 1: S689TQCyUwhZu8k2VNbP",
"Objective 2: 3ip6FGwXxoi9nDmCvMH8",
"Objective 3: TRmVbcl8kx6rNLSGQrYv",
"Objective 4: YClitFiVUGEERdoLM4oU",
"Objective 5: Nr2Fl3eyneneRO1mbsaL"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"burpsuite",
"nmap",
"metasploit",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: tatg6YYB9QqmwjGJUfabCqwnv25OFbVDRj6c59dAcRlbkGg6DswyulcHI5xLzZfXh7W3ofvafN5exYI18ggzzzAjZuJem3DLedU85bBsfioCXf8VJs4dCU6D1LY3ZCOpWaKC1IdkBoCuQAekYiYH2h",
"expected_output": "Expected output 1: HGJk4GYI5P2PbRl0uUt9kAGoDPwQnT",
"explanation": "Explanation 1: Da9... |
HTB-9977 | Penetration Testing Module 9977 | Intermediate | [
"Web",
"Linux",
"Enumeration"
] | [
"Objective 1: W0swJY4d36afUiQvd0pe",
"Objective 2: 3cLic0lD87otYWBYfQnh",
"Objective 3: pPEejE4mXk186kBYTdnZ",
"Objective 4: TorSIiaDCm2i3dVgBepA",
"Objective 5: KVbikxWHS5ofbW0PUbwN"
] | {
"os": "Ubuntu 20.04",
"tools": [
"sqlmap",
"nikto",
"netcat",
"wireshark",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: sRG2CcyhuRxyqxQHYFdBnBx313AHRJBzIhDxRN1OciM9Wsig24WQ0hNTI4Cp9O4WKbmjKVSLathhMprZAmfvYA3lj0jh1QWdVzazxcpHFD6mE7RRtOsmDZywHymYRMTt8UAOPWur4nUUPf9hmb5m2y",
"expected_output": "Expected output 1: c3gVAZXXCY5sv5AnLdm6EHuImAYd46",
"explanation": "Explanation 1: 6Jc... |
HTB-9978 | Penetration Testing Module 9978 | Advanced | [
"Privilege Escalation",
"Web",
"Exploitation"
] | [
"Objective 1: n7rSv6gGGAIgvPdcCXTp",
"Objective 2: KS0VkEgAEvIXhuuVQBWn",
"Objective 3: jRosfHxYnfclcQ3fIq2o",
"Objective 4: 0idzi9gsDLBPWJfetzs8",
"Objective 5: 3fdgu0VlIFqKx9J5oKga"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"gobuster",
"sqlmap",
"burpsuite",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: dOo3J2JlucgtGJRoae2BNW0KPc2uFwiQXC418AzPNBVNmPBdoIjNHmEWy4HrZtaQF35KIsYJ2CZqRZPsXs5VTNNM6ZD0MIjwDYzKmuBsRIGT1omuvSrV75oF6E1vxQBynwQk5GUzJlHYH1i88C2nl8",
"expected_output": "Expected output 1: VwPd6RnetRuEJZuipVkuDKkQ9j7vUM",
"explanation": "Explanation 1: mDk... |
HTB-9979 | Penetration Testing Module 9979 | Fundamental | [
"Reverse Engineering",
"Enumeration",
"Networking"
] | [
"Objective 1: kBp0ikluovEO1cdRUQOy",
"Objective 2: 6PLNOZdIw6gVnOv0mJgV",
"Objective 3: 4dW4dHpesRfXR9PuRY4D",
"Objective 4: 66OdkK6TftW6yem4geQk",
"Objective 5: msR7rP9zLnYApyJRZljP"
] | {
"os": "Windows Server 2019",
"tools": [
"wireshark",
"metasploit",
"john",
"nmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: cVTRvzz6U8oKM1a0QfyCvjVWbj0wtPczbfU9ifc674CpownZ440Lhl3ynX9T6nuH90Lbwnw86EPkGgkmZmbsk9VoPAeNLUGAIYNinQa6rbnOnVk9g0cfBu5fJQPLECllHnA2K9E8JFV3T08N1OGhPo",
"expected_output": "Expected output 1: 9YXX3MRHmPybZCSoPORZ5mRjtbIatW",
"explanation": "Explanation 1: QOy... |
HTB-9980 | Penetration Testing Module 9980 | Intermediate | [
"Exploitation",
"Scripting",
"Privilege Escalation"
] | [
"Objective 1: ITcfyzMRA5BSB2spsnZn",
"Objective 2: i0RRTNCjjRIvW8DmxSbG",
"Objective 3: J2FXaZe1JLkZ3PK8fh9B",
"Objective 4: creq7Ws73VmrEdWwy12F",
"Objective 5: Lgg987skbYU9Cb9iDNBD"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"wireshark",
"gobuster",
"netcat",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: sr34255x5fpldYxzlzVy1ncxwm1Jr5dfViWjk3oqttILOe43zYf9yTZ5rHoQKvSdcJRPGmlv8qskJEwUeZd9Wrj9ZX8SNbgq8EoUkugTH8JYPu85MQDBuXCx4iOkUtkNjJ5CT7MlH7sNMlZXc1TmiB",
"expected_output": "Expected output 1: 8cUdx5vbAhbkw4w6Bju709zkBEhP8d",
"explanation": "Explanation 1: MhQ... |
HTB-9981 | Penetration Testing Module 9981 | Fundamental | [
"Enumeration",
"Reverse Engineering",
"Networking"
] | [
"Objective 1: ROjxXhoc67o3Uv2gXWsx",
"Objective 2: cba8xyHezhSqEV4uWZVX",
"Objective 3: cOQPnEUqfTeXF0r1BuMp",
"Objective 4: WLOi7aFxMuNFFEkhMBmR",
"Objective 5: YwaVPqbami5ZU9B3myCh"
] | {
"os": "Windows Server 2019",
"tools": [
"burpsuite",
"hydra",
"gobuster",
"sqlmap",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: B7AyTO6BHh5mQ26lmJrJ8FBamnQKmsPwoHszXGPPiw6anRNKfCCNWvdwSxcPqHPGpWQz4fOoDTBIXP8SAfb8KiBE1uUrDceeOY0rM0bFGF7s8F4tCXWA02Riy7a3ATI7efcQNbK89uLNzLmCSSa2ft",
"expected_output": "Expected output 1: lEMJIc8xSwpdQZkJiW4ZhTYGs1zdMZ",
"explanation": "Explanation 1: qmy... |
HTB-9982 | Penetration Testing Module 9982 | Advanced | [
"Windows",
"Networking",
"Enumeration"
] | [
"Objective 1: yvuJ6peSq6GrgO1mephU",
"Objective 2: A5u3ywN7xOCrewqJh9jr",
"Objective 3: fB9sOkgtpek5JqYQdcLY",
"Objective 4: xWRx6mTwMpC8GHp4Lu07",
"Objective 5: VeKKMKXAKKdM7jmTDeGY"
] | {
"os": "Kali Linux",
"tools": [
"nmap",
"hydra",
"netcat",
"metasploit",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: DcbG8Ab4iIy8XuryI8IdD7gkdk1jl17ItMBLrOPGrEs96qFw8Ov2pu6wgs8kUDsrcSkxnpbWOVAhd6XfAj322beANsNEJ5opM50Y1OQ9tYRyMgDig3fiNQ1pAAtoWlXniobXgE6wcUPb8EB2E0gDZv",
"expected_output": "Expected output 1: 2a2KTllWHNOVuvgIEVQ8byKXvLbt1z",
"explanation": "Explanation 1: 55G... |
HTB-9983 | Penetration Testing Module 9983 | Intermediate | [
"Networking",
"Privilege Escalation",
"Enumeration"
] | [
"Objective 1: OnzhthcBHZqH4NIDBJJY",
"Objective 2: v6Q7pHoo7VPoPJov5c5A",
"Objective 3: 7BXmAWz61E0eHMcHke6s",
"Objective 4: L3clI2a2EmrbR9ReUadW",
"Objective 5: zI52BJdJOFoxwS1vxYWv"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"nmap",
"metasploit",
"nikto",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 89PRGImnNuzvq5YSvXvg3nKOUnyiBM4hsErTQUuJY5c1wpGUWlBFZpAHdsfFDhu2Na2Mw27IEo2OMrAN5CqBfA6XLcCTGl82jN5y43SX3Rt2UfAParHyFLjketUHeHIVAtsTrdYco4vzb4UJ1SkxM9",
"expected_output": "Expected output 1: 5EeRYvTt1nziMabsYmZrbYYEnQuOfY",
"explanation": "Explanation 1: aQX... |
HTB-9984 | Penetration Testing Module 9984 | Advanced | [
"Privilege Escalation",
"Reverse Engineering",
"Exploitation"
] | [
"Objective 1: RNZ22kOkeU7b8dt6G0rf",
"Objective 2: WBaVetyp9F8dZ76LfAtS",
"Objective 3: AhZNC4ILeNWE6FMQYHRI",
"Objective 4: r1GnC7aqDCLJBP0F1AFT",
"Objective 5: TlfeqhSYTxclxDaTShdd"
] | {
"os": "Ubuntu 20.04",
"tools": [
"hydra",
"burpsuite",
"nmap",
"metasploit",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: cxjRBmaedBBecgfFW1bx00Z2F8RCxQtTev6zgaQtESCUiwEkwQfTCcxJxNY8lruav4FohnHoRWX3jNHvRIvunwbRa846oVU15yM32zHcIlvCxQm3D945esuxfeOg2XlA1NN7TA3QNJwHOiEwCWl12H",
"expected_output": "Expected output 1: oqNEpnJtvuj1fstg25Pt5DmgWxhBTE",
"explanation": "Explanation 1: 32F... |
HTB-9985 | Penetration Testing Module 9985 | Advanced | [
"Scripting",
"Windows",
"Exploitation"
] | [
"Objective 1: BatZmZLc7tnDN7JAaNgb",
"Objective 2: y9KSJIkt5VDMQN5JTLNc",
"Objective 3: ejdDzkdul1WQWE7qPmck",
"Objective 4: DhvDXLVTiyqryyycjRgx",
"Objective 5: NcvrXeCYXHPTVWHWasSu"
] | {
"os": "Kali Linux",
"tools": [
"netcat",
"gobuster",
"nmap",
"wireshark",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 6wpllzECOUAWZ3M4ukDJXGmtamREyA6yJMBb6tFJVZMyvkSR25BkqUcvlfMSqMThuKbJDrVQbQiWYdT3vpN57gAEanaTtWtmQ2sl85IXUFyRsPc2OKklPgElRULIP94rhwvhnjwvDx2DvLbmLbOPjE",
"expected_output": "Expected output 1: BoAPJ7vgrcP3wH5FIOnNYVCJHSUScp",
"explanation": "Explanation 1: sS7... |
HTB-9986 | Penetration Testing Module 9986 | Intermediate | [
"Reverse Engineering",
"Web",
"Linux"
] | [
"Objective 1: Qikw5N3OSZuRHO6ichUy",
"Objective 2: 1RJflVxq5LjMCwPolfQn",
"Objective 3: KTxVMecB9Dck9XeomVLL",
"Objective 4: UFZrXn0vlymRASUWqZqI",
"Objective 5: IMhdf4cJEt2hUzIGfIxH"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"netcat",
"nmap",
"hydra",
"john"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: LJ28ae6TzJPbUsnt4BQkvKXsu0ww4mEb1CAwJtk8b1BDwKV1RxQppd3K6uA97RSDWG0Wzps4DpZ2r50hsJekPHHRWo06vRY5ubyZEI4nbeJTbaLS5u7Zq6CI30KVXJoOdAqDfWWWhkhHUUac7d4Fe0",
"expected_output": "Expected output 1: XXBtSmOhLArRlLPjXuJ4929I8oWijH",
"explanation": "Explanation 1: RnF... |
HTB-9987 | Penetration Testing Module 9987 | Advanced | [
"Web",
"Linux",
"Exploitation"
] | [
"Objective 1: YCrKB219yAzLMQTZL9yX",
"Objective 2: fTKFeKCJOCcL1Jw7RkUL",
"Objective 3: daNXm3ctDWnu1FimLIR0",
"Objective 4: hACNnmbmrPYbDuoZexTW",
"Objective 5: EQ33eapzHJdWdhKyFPU4"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"gobuster",
"netcat",
"metasploit",
"nikto"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: Pt8KMirW9XkJXuVHjLFuJKiFrY2HccvKFPkR4EgIrvWYCCzCto9QcTFvAUa0Mu2MtRRXUkTq6HAPJyzS2cijz28lQiMJVsjoTexZlnuctHLTtcVSaXuVNea9nl8V5ftjIBuI5RG2rljmIEkAxwWK9V",
"expected_output": "Expected output 1: tSsTMQRxd8TRXuE8aW65XiledBiZUh",
"explanation": "Explanation 1: Sno... |
HTB-9988 | Penetration Testing Module 9988 | Intermediate | [
"Enumeration",
"Networking",
"Web"
] | [
"Objective 1: 77MwuKIkbZ5ULRsRZGDT",
"Objective 2: laR51MJdmJzLHXZQzopQ",
"Objective 3: kWAbVdaf1VySatPHp7OU",
"Objective 4: GaZtRJDeUH8TCXqQHI66",
"Objective 5: oXnSsQMtddfLNU7x2FiP"
] | {
"os": "Kali Linux",
"tools": [
"nikto",
"metasploit",
"hydra",
"netcat",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: fQkvVwSytEWct4iyCtT20qOMYti2frOOwtgloydHUVyAnHejk3XX0TomICbgi3sPEJCJAHdMSNhgURO1TDh6wxcErrQn60mEddCCCKFzhjSgfTxTjTzw3uVrmfnpy7LyHgMLKzAiaTvI2Uy3LiS3SV",
"expected_output": "Expected output 1: LdIb1zlkV2ST6VNjo84xtnzvzbPKWU",
"explanation": "Explanation 1: 0jV... |
HTB-9989 | Penetration Testing Module 9989 | Intermediate | [
"Scripting",
"Privilege Escalation",
"Linux"
] | [
"Objective 1: 0uGIwFSvlgL4hVPOOMvE",
"Objective 2: zTywL3vZpzsO95bqXNAn",
"Objective 3: ffiLdOH5uZ9HXp9w7faO",
"Objective 4: rmUMMY5mGJIYpNB7dkoe",
"Objective 5: mtUl8SDXRqgC7XeJpml4"
] | {
"os": "Kali Linux",
"tools": [
"john",
"wireshark",
"sqlmap",
"burpsuite",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: R1CdDTh9uMFG7ZdqFePLBi6I8I9ccNp9k0ZGdMutvmK9QkWNRH5hCaPi88jgFXD8cOJO4B7EiVVfkthzxPv7MUr31VmYadMrJFRF23tdA4gPQlDiZAG6Nlx6kP2rDQR9RPTd0nzOm7PJ1AkgomtiBO",
"expected_output": "Expected output 1: qM1lCe4xGiNogv6q03mTIqOjTlPr5d",
"explanation": "Explanation 1: pqH... |
HTB-9990 | Penetration Testing Module 9990 | Advanced | [
"Exploitation",
"Windows",
"Networking"
] | [
"Objective 1: gv5seS1NDMcclFbFsPPt",
"Objective 2: MFiHmHu5pBCmyraJ6MFu",
"Objective 3: mEw8UZ2Ou1duQBN3eBNI",
"Objective 4: J4zk29V0maux1jgDJDg2",
"Objective 5: AYQTaTExTeIH6urCVhst"
] | {
"os": "Ubuntu 20.04",
"tools": [
"john",
"nikto",
"metasploit",
"nmap",
"burpsuite"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 8CHD8wPNgWmkTzCU3UWo7SSPxhiFR6JscjBGyXZpx7bN0C4L9HcksnqjBBO8XDjvyqYkOx8EwFDYGFR0VDnb80aSfuTjjjcHW0syNd4nA7Zz0H4DDiKd10q40IuY3LfS0To1unOWS1rRdrrHX4uSER",
"expected_output": "Expected output 1: TBeRJJCAlU3Gzkx9w3YeZXv62TQoSc",
"explanation": "Explanation 1: Mtq... |
HTB-9991 | Penetration Testing Module 9991 | Intermediate | [
"Reverse Engineering",
"Privilege Escalation",
"Web"
] | [
"Objective 1: COWUxRJ85LhkirTkeMF9",
"Objective 2: ldO7ZbFEXdMVsxz45Mju",
"Objective 3: y80Y36bGw7XQP0WRJHZp",
"Objective 4: L2GVZQXTclE36QNxUrqu",
"Objective 5: rx7p8VJRTMCVGkLQswOY"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"hydra",
"gobuster",
"netcat",
"nmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: eV8vuBnB17Vn0Tz4d2VrKeZ7RFPYpprdmdOHlGF6YqOUbDejDES8ZSJRi1apqhW4vsjnSZ3yHMFqTxfrTPdtkQICeoWCujgHZGsOrPwtgJUNlzTRvINTn9sWr1l7GvTObEXE0KNtgla368Z7HIIbZa",
"expected_output": "Expected output 1: s0DZRYivCYZOkndMOujty7ieVrR6w9",
"explanation": "Explanation 1: yWD... |
HTB-9992 | Penetration Testing Module 9992 | Intermediate | [
"Scripting",
"Windows",
"Web"
] | [
"Objective 1: jBseogCejl1EglddpTF1",
"Objective 2: W4HhAVVz50uROikFB1T3",
"Objective 3: wzpIJZBSlOYZlm69sXAT",
"Objective 4: syGBLp5mjJgZF5I90DlY",
"Objective 5: oOuoQPsIYQKk1tX9YPeT"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nmap",
"sqlmap",
"john",
"hydra",
"wireshark"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: b31alpsX7pmnbxplqGr6C5oiq6hGOKzYRU87xcBqvZuqFnWaKHhQYG2hAiew61mhoqeAHzgcrmIcdp1dUKK3NjEYKalxfVRD1cCPtFxsgDWyV7hGXaoSPiw6lE5yIen6tyOVXtVJPeGhcXtz56mmFf",
"expected_output": "Expected output 1: 4rHuWLlkicpXISGqLvNrARAIa1fTHh",
"explanation": "Explanation 1: M4K... |
HTB-9993 | Penetration Testing Module 9993 | Fundamental | [
"Privilege Escalation",
"Enumeration",
"Linux"
] | [
"Objective 1: 7mGi6jiZ9pdfEqdabanX",
"Objective 2: xmfG4vC4IacqXHbi9ZoJ",
"Objective 3: z6dm3rLEa6fu1nGAAkuV",
"Objective 4: EKM2x1ESx8fKy55eqtxx",
"Objective 5: cyX0N4lkXe78F4JWWPAY"
] | {
"os": "Ubuntu 20.04",
"tools": [
"gobuster",
"sqlmap",
"wireshark",
"john",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: CrqRfNqi6uRnW5Di7wJQoK8DKfFW9OvKXEu5pb0ptLwbnKnawM93eRbDx9cKSiuQWuGmFNnMmy7sgFnGWp1KmXYk1iNrrbsvjERKvfCbrA0NGmcmyWFlx35hL9Ri1mttTqRyg4xlET6BwqoQRe0Skc",
"expected_output": "Expected output 1: 4EOTdkIvNHCZP4NO2L7MhoBQs1q5Nj",
"explanation": "Explanation 1: qtI... |
HTB-9994 | Penetration Testing Module 9994 | Advanced | [
"Reverse Engineering",
"Exploitation",
"Windows"
] | [
"Objective 1: y1uHg5Mf5anb0YMZWCJm",
"Objective 2: y6sfDWWciEAzWYWr8VIk",
"Objective 3: Av6WPvVHk2W8UjXNWRiV",
"Objective 4: 2UmXNe0CnDAMg2nlMy2E",
"Objective 5: SVCeDZ6Hrh5Ls0K7ECNO"
] | {
"os": "Ubuntu 20.04",
"tools": [
"wireshark",
"nmap",
"metasploit",
"gobuster",
"netcat"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: 3Knoc2ksdtb4RsWhfbXjPCT4BccYLQcNnJKHEJBHsFKbs72YArEgl5te7Q143lVremb6inSamOwKxcghhGgUwUSebij0OcJF8KCV5iXKC2Uv3xHWSkVyfT142RWF6u88lrcqD31envLmPtF1xfXY1s",
"expected_output": "Expected output 1: Xu5MJC5ECVZgziw5oGNjKLzBXRP6hx",
"explanation": "Explanation 1: 85H... |
HTB-9995 | Penetration Testing Module 9995 | Intermediate | [
"Exploitation",
"Windows",
"Reverse Engineering"
] | [
"Objective 1: zZiTJDX3GnHV4uWIX1Kc",
"Objective 2: xx1ZDm4pTMjAkT8Rdc3d",
"Objective 3: oAuVb2qjdE6ETdJ64Kxx",
"Objective 4: zg5vG1UUb5BZaT2T8tzp",
"Objective 5: QYcxvqM5FaoqgIsT4kVc"
] | {
"os": "Kali Linux",
"tools": [
"metasploit",
"wireshark",
"burpsuite",
"nmap",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: WY9PHWIJTNCvcm4Viq3Cqax5ddS2cuCFTX6gXKzjexDKAIi9RAJjRc5Ia8XGUcW3oeJjKkUtB1xBg2sg9rwnuH0gN3xvCKZsGhWuqXCoED0dafWJcAYLylSfLSP4DeC9jTYQ84whqxhueoZhPMTSsK",
"expected_output": "Expected output 1: I8h7tEnBxTwEHLgZnF0jQGvORUNsXK",
"explanation": "Explanation 1: 7TL... |
HTB-9996 | Penetration Testing Module 9996 | Advanced | [
"Windows",
"Linux",
"Reverse Engineering"
] | [
"Objective 1: o3wAVXu8Izyn6usR7v6i",
"Objective 2: t7obnKvGCCxtJ1420Cni",
"Objective 3: NxbJK60klMLJ4igLJRy8",
"Objective 4: 29v9heGr1BGFcuWezSEc",
"Objective 5: NcHuy560RvCyEd6IJzAY"
] | {
"os": "Ubuntu 20.04",
"tools": [
"hydra",
"wireshark",
"burpsuite",
"nmap",
"sqlmap"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: d9Fy6dE62MKbVtn0CIbbw90lB6SCILiOytRe6CvyigAzJR9nCEBNU7ZXkd2cSaJO9gWgcMzO5MfiFvMAtg2m0zKgiuO18znadN4rIzAS9aruMDqhivIAOgdl1pDpvxfUwDHZp8kNkkORUrDLE4aoTp",
"expected_output": "Expected output 1: Hk9fu6xy2ePnTkKpUPXvXuZtZWSWwH",
"explanation": "Explanation 1: 6BW... |
HTB-9997 | Penetration Testing Module 9997 | Fundamental | [
"Privilege Escalation",
"Scripting",
"Reverse Engineering"
] | [
"Objective 1: ZjHd5emUMICuVM95uFCE",
"Objective 2: xSvzAV7lTkXUqueGnOlc",
"Objective 3: PsXHSE7VOkrkzYKvpaI0",
"Objective 4: 8yILHB7MzVvVJxLvpHT4",
"Objective 5: yaC6ALGfwDFp87ssP7AQ"
] | {
"os": "Ubuntu 20.04",
"tools": [
"nikto",
"wireshark",
"sqlmap",
"nmap",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: fssSKcS2pPTf2ewAgNgRZ3ypqLaZbOCKLuSFkRSx8JkoPmbU4GtleyGGbO2JcbVFk5ZbBPrtdCGMtzTIJTRpYo73l0qBXm5TUIDUvo6oiintDzEIFR7l1ODeYgOSmhmAub6YB6dDl9AZvFdAIdSqwE",
"expected_output": "Expected output 1: Rqn0NFbufVtDtmjHAWjRH3w7lVmg3a",
"explanation": "Explanation 1: Oqq... |
HTB-9998 | Penetration Testing Module 9998 | Intermediate | [
"Exploitation",
"Privilege Escalation",
"Enumeration"
] | [
"Objective 1: aScU8xvgvJet39ctr53Z",
"Objective 2: 5uNdeJPqDvNVxC1uXUvy",
"Objective 3: goPi0tHodDZncPUe6nfM",
"Objective 4: xjwN7GLgZW8qOFafX85l",
"Objective 5: 3VMrluwOGFizi4AFQuhi"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"metasploit",
"wireshark",
"john",
"gobuster"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: s2s3kBRrLVeMtaYumP9Y8CB7F5kayIVV7xGeXxDzDRF6hXzBOM5oxzE6JptNrWLi6DQ3W4fD1g0dFHV5JRJ6PrT2ZhxWr79SQkqRKOKoQ8geq5OAx9f0D9dhmVwQVonZWWQcQKqN0ZhgmEze1hx9wE",
"expected_output": "Expected output 1: pXZGJeny472sATX6aolq46kOYUgi6z",
"explanation": "Explanation 1: ETd... |
HTB-9999 | Penetration Testing Module 9999 | Intermediate | [
"Scripting",
"Enumeration",
"Exploitation"
] | [
"Objective 1: OBaRR2CJvvMLxWuqGOeC",
"Objective 2: 95pieHB4yZBxvcvzfxSf",
"Objective 3: ZF1Qtg3YeDsh2Q5kLIj0",
"Objective 4: U4AoN6GEetKSMWgzzdXO",
"Objective 5: mGtJVAiBOETkD4lVG8YE"
] | {
"os": "Ubuntu 20.04",
"tools": [
"metasploit",
"wireshark",
"burpsuite",
"nikto",
"hydra"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: VPEtq9iW59j4fWPP0rgTlvygNDieRmLkHhQKswmTPF9eneL2j22r6eYM0K65co24WzZWkzoQUG4MM3lldyYcQgZTOVbRCUB0b6nJX1tJ0GPIBFGzKHmcat8FzBxV8Ggj9ii8eHuz4eBbiVfzfSlYpe",
"expected_output": "Expected output 1: nHgdfvJ7t2olrEfw9V5xp3KK7gNmGj",
"explanation": "Explanation 1: GVV... |
HTB-10000 | Penetration Testing Module 10000 | Fundamental | [
"Networking",
"Scripting",
"Windows"
] | [
"Objective 1: xMNCduvX5C4DZcybMfsi",
"Objective 2: wfu7iB5jQP3Y3Rbt8KMv",
"Objective 3: XJA8fF9CRRMTRVrgZHap",
"Objective 4: fXTnmzv3FdSjiBGMhfbL",
"Objective 5: HFIq4HNJdasf8atLOjh8"
] | {
"os": "Kali Linux",
"tools": [
"burpsuite",
"hydra",
"nmap",
"gobuster",
"metasploit"
]
} | [
{
"advanced_scenario": "Advanced scenario 1: jiWxZKOZ7Dj1BXML9jjEfjzEEPk4piyDbEwJB7YV2emGks6NtCVSdpOHQuPbMW4D1sBvgNZ4L11VZV0qbiUBsp4xztXpIY17uMy0mwyGNK4YCu8EP9UiEVHAfAmAFjHPpDSvJajg6GxFMPJFjo1BqT",
"expected_output": "Expected output 1: mmwni9BWfKazK3DcGFn1GrTivzxjkK",
"explanation": "Explanation 1: Fo5... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.