module_id
string
title
string
difficulty
string
tags
list
objectives
list
environment
dict
tasks
list
HTB-9901
Penetration Testing Module 9901
Fundamental
[ "Exploitation", "Linux", "Networking" ]
[ "Objective 1: oaM8xsVTcLlzbQhohelc", "Objective 2: yEaE743jeHxHbSg2vGvy", "Objective 3: AgL1PfGyFnyCrsKgtu1F", "Objective 4: LicF80gsrgX4rNdBaPpb", "Objective 5: flNI5oIHyx8VbBVE21XW" ]
{ "os": "Windows Server 2019", "tools": [ "nmap", "wireshark", "netcat", "gobuster", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: 14lxiMp1ObTDtOVYiVxeYiNqKHNdtUhc7xG41rPDHUDu4HfMEFcGpEk0XQXydJ9gIDdJwCzuKjXtK54FCVOg9ba8Cr7FoxHGs5XUi2pFdDlR6ga3UNM6D89IlWj4Y9POmWUxeAeVG1MIXAssZs0AzL", "expected_output": "Expected output 1: 33py51d6mhTD7uq2ujFooM7g8V2ZYY", "explanation": "Explanation 1: uD0...
HTB-9902
Penetration Testing Module 9902
Intermediate
[ "Web", "Windows", "Reverse Engineering" ]
[ "Objective 1: ighDfs6b5SKi0EVvxKuQ", "Objective 2: 6a0k7UQMpIGZV2mGLsYQ", "Objective 3: Nd9qb7w6Ozcjgln4bd6X", "Objective 4: N2FobEF2KXbzOSqdIyMV", "Objective 5: QrbXHuubn6bfBUX40aaQ" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "metasploit", "nikto", "gobuster", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: bempRtxqBlXERrPIzbtLjECDcYe1U3AQ2JJCrUhXeEBpbZhjJK6bnt0xPQRRsvY4eUm5z48w353F8lkI7LAazpuTaXf9KmfNrPVmtrs6wm6Jw2Sb3TN7JfjXqrOHIlZNTVkgMWRxYJVXocQtHsyzW3", "expected_output": "Expected output 1: 4Kt5HD8IfrdObOuCBlbFtLKqLFdQ8Q", "explanation": "Explanation 1: eBf...
HTB-9903
Penetration Testing Module 9903
Fundamental
[ "Reverse Engineering", "Privilege Escalation", "Web" ]
[ "Objective 1: B8Eabd8oljxiSRwv6PcI", "Objective 2: UyqmeI095mDPvKOLHh5E", "Objective 3: F2x4vH4DrC5yWcrdyXrA", "Objective 4: z9kyw4GYJUXr19xILiQq", "Objective 5: TIjZu5jaLWOhJnYsRKay" ]
{ "os": "Kali Linux", "tools": [ "netcat", "burpsuite", "nmap", "nikto", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: ob5CUZHEQMiaaWAo15MhfTqZVGEhYljVdH4f7hqoe3nEkncGw3fIwQLppGDvZSNqOnyR6gPMv3IeTeYF5JnYqIccHihaDHrWjvgzp6QyzvJ6JxmZmOJ31390J1DW7rouXfTtneJ53GB3UyUbVFHzY8", "expected_output": "Expected output 1: rFOB1XKVc1GmRkyfEPN91aOeqxcyeZ", "explanation": "Explanation 1: Pwp...
HTB-9904
Penetration Testing Module 9904
Advanced
[ "Web", "Linux", "Scripting" ]
[ "Objective 1: n8ZKdASg5mtSu4fLV3Ye", "Objective 2: PlPM7AnDuCtoH9CQYvI0", "Objective 3: 8qYK5ZGRvmdJxenjjKLn", "Objective 4: 0QRBtyJTrWTTERIQ365R", "Objective 5: bJm4UqLrIVXxI0JNjo61" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "metasploit", "netcat", "sqlmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: CA2p0T5zlLKhQOB0z0xk9EMqAmo3JS22jXNnXLir7OEBRWnczvXQ5ahwd2yTy2LlK9pGvEj9GJonHaK467VgieEbYyQlDalKKJC3BIyNg1dh4L6Yebqgw2asb4ha6RzRwYBrcSZuubxh0kN2zOa4rw", "expected_output": "Expected output 1: ig2RZsL4VMrgoHQ4eIWL4fgtIeq9la", "explanation": "Explanation 1: vAa...
HTB-9905
Penetration Testing Module 9905
Fundamental
[ "Web", "Reverse Engineering", "Windows" ]
[ "Objective 1: 230hwRDCw2wzVFlZzSTY", "Objective 2: D8Eh12POGVRrztUcPede", "Objective 3: 5pFV4uIwCqvwkyh57xr1", "Objective 4: nkMY8p6sIwZhPvrKWEVt", "Objective 5: 9tfnUViHvjFlEwYu3ANX" ]
{ "os": "Windows Server 2019", "tools": [ "gobuster", "metasploit", "nikto", "wireshark", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: oVsJ81fdehwT2fQZJtiSFTMFcI7ox83BwbvpiTslhVF2rml1uGyd3FHgQOFzAHgKrXSNpF58jlGRz4iknhFGxJbFpiyAlKPJ18OF28paukw3bMOFbPcJHpgpt5lLEZv9kpeER8Ds3LMogwLcidQXTI", "expected_output": "Expected output 1: sJLA2M0UF8GBTqgtQgRwAEbZIfZPQE", "explanation": "Explanation 1: Taq...
HTB-9906
Penetration Testing Module 9906
Fundamental
[ "Exploitation", "Enumeration", "Privilege Escalation" ]
[ "Objective 1: M2oi1xrkkuLPisEzby6v", "Objective 2: 0O1W0fipSRWeLxfBuZK8", "Objective 3: glBMgCjCX4Yjv59fYwUD", "Objective 4: 4bWeQbZArLcFF23LR2Nz", "Objective 5: AVjw7zSuICzMgQM7IzqC" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "wireshark", "burpsuite", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: Ci9GeljZ1tJKRVdv9bQttrSYNpkliL8QjWwTXdhjVJUGkhVFPfeXHdKoOFFqLtOC85eHzKZHDJ7NDUgygNChAEazUGdssFWRJWx4YvjAiV1E08aufobpiaBah9S6ys6FL6gfz2do7pXgkKGBeQzi60", "expected_output": "Expected output 1: O6w6cUIl7GD7eMi3ryd1V8ZdbfKajY", "explanation": "Explanation 1: xfU...
HTB-9907
Penetration Testing Module 9907
Fundamental
[ "Scripting", "Enumeration", "Windows" ]
[ "Objective 1: 87IT8Ue4cPtv0gPp4GWe", "Objective 2: Wz75aCmTqXDb7DooswVj", "Objective 3: vHddZunA2XLJSUF4oy9c", "Objective 4: 8yW1vESI7i5L69lt2WO0", "Objective 5: DWAig7PKKVF8N8XcKjnl" ]
{ "os": "Windows Server 2019", "tools": [ "metasploit", "nmap", "burpsuite", "wireshark", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: WCyazbuUZ0SktiZ4wNrvOPAV2nvQ70azZgdh24sFIKf3q0ISBMSi8uMzSERjqRY7a5dsVth03J8XgXHXLUqfZqMyh0fiqRhvtJsKjdjk2aRPRR5h2zFoCB2JywUKsAtW6u9kaLh4r385HjvOiI21Y7", "expected_output": "Expected output 1: RWYj9fzM1YsyrdeEYJ7TMrIsVFUDgf", "explanation": "Explanation 1: 5KC...
HTB-9908
Penetration Testing Module 9908
Advanced
[ "Web", "Enumeration", "Reverse Engineering" ]
[ "Objective 1: OUwlBLLIT88S8X6NDm7b", "Objective 2: ZyWd87PF70PHHD24oBmb", "Objective 3: fg1XhUBrB38lmLEwjugg", "Objective 4: dud083Nc672gVHlQDlsA", "Objective 5: PDOYxYaJJh0hvi8wTGUe" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "burpsuite", "nikto", "john", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: rBlwSxA8uizWmOenuhiDuEVjELNRYg5UYatye3WbSu6YeYKrfn7GOHEZCRTV3KbuAaYBA7jEPXuXuCHDYxbrjRQW22bYeLIs591eW5aXSJU6u7mnCk5xL68n2tPbQ1ObED2xUr9SBIs9VvN7lczU2W", "expected_output": "Expected output 1: LElXTkPF05YlQozKn8DccFh0UmpYtV", "explanation": "Explanation 1: cuv...
HTB-9909
Penetration Testing Module 9909
Intermediate
[ "Web", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: szjSh6Zd610OZ4u6ddF3", "Objective 2: Ftcoj7jAtt6XFv6b3EoP", "Objective 3: sBL3wDPzp51ri02pMMk3", "Objective 4: TU2NiJgWCjOzxUEsv9g1", "Objective 5: MjG7BoboF3M37HltoOY4" ]
{ "os": "Windows Server 2019", "tools": [ "gobuster", "metasploit", "sqlmap", "john", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: wi2UefTjr3xiAp1j6BOYYzht11cwdkRzcXVzdt3rBO0eIdmxH0EptoBQfC6MDZk2nWdSyVVWc0jic4ZUhC7O198OESGE5VWLTQMpv5WSN5qF4Bwy1xX7BxRQtomtOgao0l3GuDtN9uUOGtNPzMV6ap", "expected_output": "Expected output 1: IrUwjp8cjaYs7vzerGtgTlrsLhCl5U", "explanation": "Explanation 1: Sfz...
HTB-9910
Penetration Testing Module 9910
Advanced
[ "Enumeration", "Linux", "Privilege Escalation" ]
[ "Objective 1: FtSISDYiHclfP7y22rKB", "Objective 2: P73rZK0Qeqj8apQ7CrNN", "Objective 3: 163ZOwJHRLprTIMTkyiI", "Objective 4: ZmJcYfuYVWzbhpvgOFPC", "Objective 5: emRM1wgtsSIaMOhcXb3z" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "wireshark", "burpsuite", "sqlmap", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: vOAc90PB6JoxVylHZCq9phw2QQySwfiWOT9LcjBLSpUB8JkyxnHGGVAbi7t1QhiOEs4vDBMwvhGQIJJTKdGprUDBJwJ33zZ5UvhA5wW4Smixv6689pN16rdjf7NR7VMbHlgIUNbiI4HYHZwjz96FVq", "expected_output": "Expected output 1: idY6JfiAtdMHHqz8PppzeVafTltNLf", "explanation": "Explanation 1: N8i...
HTB-9911
Penetration Testing Module 9911
Intermediate
[ "Enumeration", "Privilege Escalation", "Linux" ]
[ "Objective 1: cJ4Em6tiUHPUp85qs0Ag", "Objective 2: qkPpgC0G2jNW6qx83SO2", "Objective 3: wVN5Q5fEduCnk78JmCqK", "Objective 4: HEefFWbfps00X9AXz9Qm", "Objective 5: tKBK5pyU7gfSU5lPz9IE" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "nmap", "burpsuite", "nikto", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: dS5IoHTHb3hC742ZD9LhhRXjyAmpfo3YFw7Xn7oP02daIRyJrMec7i1z91Ns1cggFVMARf1gThWX5ZZVDKqxu72AhIgp20x3W35DcjOgS2iuhhDmDyA0NU5FyasxTUnTu28ntIoeu6LEO3Ng1gH0DJ", "expected_output": "Expected output 1: sjcBifKvOBI0kXTzLI46XYh56aZC6Y", "explanation": "Explanation 1: k8f...
HTB-9912
Penetration Testing Module 9912
Fundamental
[ "Windows", "Scripting", "Networking" ]
[ "Objective 1: E2SyfgOJzOHdfJF46D52", "Objective 2: RzF0XZgG2LWE1qV0pSDY", "Objective 3: FsLVyHAQOAPloEbCFYFl", "Objective 4: mb5qdTF2Rz0mDCIj6t8p", "Objective 5: LoX3GclAGc5NsH8R2L5j" ]
{ "os": "Windows Server 2019", "tools": [ "hydra", "nikto", "nmap", "gobuster", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: Q59G634cXtn9v1HOpLIboiF6P7ehljJoUvSVIAMf9f94w8UdCGq5SSI81AdF4CG55OQf3N7i5zxznoYiZu5YYwWNB5AMQ72RcYio2UmymUueJBjDpttdcvESImtFHcYiEXOQsNXcm3rGLDCGvwnjRZ", "expected_output": "Expected output 1: V27tg3VSPiEZehJaL8bK7iUNiBmeWV", "explanation": "Explanation 1: cK7...
HTB-9913
Penetration Testing Module 9913
Fundamental
[ "Privilege Escalation", "Enumeration", "Exploitation" ]
[ "Objective 1: j4KODdEfV8VXDs3pMTL7", "Objective 2: BFQ4avcTMpNb5cc4EB33", "Objective 3: k1UUmG9m9wMJEwX3t1q8", "Objective 4: Vw22RsK0wUMAn7tbEsje", "Objective 5: 866rUukAjGHqb1CNp6Hk" ]
{ "os": "Ubuntu 20.04", "tools": [ "hydra", "nikto", "netcat", "nmap", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: Qm89fde71tnmOMX3DR3fELvaeBQ7feFE0Q8WCOlKcE1KMqbxR3CvbSBTcRBw7l3l1Co1fj3QbGZKU4polO6BZoXIdNkc7zEYTtymncmml4oIvU4ck882jchNLxr6RfwOkHvx1wpLWgEggfmslayKbY", "expected_output": "Expected output 1: k8TJTQn0asbSyJNGPX0kV5r9bKHS4E", "explanation": "Explanation 1: MTK...
HTB-9914
Penetration Testing Module 9914
Advanced
[ "Web", "Reverse Engineering", "Windows" ]
[ "Objective 1: qAOn9NMrgF9jX4Tz5qlU", "Objective 2: 92G64fTGcFx6ZPHaLVp6", "Objective 3: xGZGuoWTO3BrTwuB88Ip", "Objective 4: L5WBIwIsevx9uJSYQaAl", "Objective 5: NZWTzI65TYpyMD1fssYU" ]
{ "os": "Kali Linux", "tools": [ "hydra", "burpsuite", "netcat", "nikto", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: fKXsKvnKHh00Dw3V9gg0i9KpKayJ3uSzIuEabrtqhPBu0T4vP1qMviGWg7sP7SuFAr8DusKBC7TcjMz1a3L7xaFNZxIe3Ty9ezOd9KKnUsZRSqPe86Wz0M9JPR5yCyEU1uq4xtGLERQs123xxgTCwf", "expected_output": "Expected output 1: BJSIYCfJ0RpZPJ7VJdFiZsEuefCJ6a", "explanation": "Explanation 1: Cun...
HTB-9915
Penetration Testing Module 9915
Advanced
[ "Networking", "Scripting", "Exploitation" ]
[ "Objective 1: h9oBEFOjtJMGD98zUaQZ", "Objective 2: VuG9rLhzhKMWWxVxQIAt", "Objective 3: bPjXak62ZcRucagGxHFu", "Objective 4: abQr0begn5vzplMxy6mU", "Objective 5: 34OFK3zRnc1H9VrctwSK" ]
{ "os": "Kali Linux", "tools": [ "hydra", "sqlmap", "gobuster", "wireshark", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: RH2V726cRPbYeWoNByO94hRTA06U2duSCh0BGxyV2vvzjYxOa2SwbqROG6XWeElP5b8wzWMTBPewnibidJn6IBRMResTCftNWqE0Zh9QsAoYeMuhhm3s1lQ3G73m2K6hyxpEBO0K8eK0Fz4H3lZF9Q", "expected_output": "Expected output 1: McP6HoPt8zMZKkOxzBDMykN4PW5ajP", "explanation": "Explanation 1: aw7...
HTB-9916
Penetration Testing Module 9916
Fundamental
[ "Enumeration", "Networking", "Reverse Engineering" ]
[ "Objective 1: LWxqJ0AdVEkZWR3cpegn", "Objective 2: HqwUMC9V1CkBIQwNt1yL", "Objective 3: bVOcS4cOmhz0JJZOERAN", "Objective 4: RzEgHRZeOqees6BugHSy", "Objective 5: zFvWCUsOGT9PmAKYkkL7" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "metasploit", "wireshark", "netcat", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: EULI0GuXmJxPzkyExCXh1GhiLKmcVtnLoCYufUbkUZj3r6zw9Z9jbqyCVCxDuRDuMG0SMnODf3Q5jE8kYseetHlx10zVcM2zLo6m3ecwE1OlVf3VGi3GmIRfU1gMTbqX29OD3WVz9WBKx67XYAt6SA", "expected_output": "Expected output 1: YFed7qI4n8CCXGlBK8hjyPetBKz1h7", "explanation": "Explanation 1: oRO...
HTB-9917
Penetration Testing Module 9917
Advanced
[ "Enumeration", "Linux", "Exploitation" ]
[ "Objective 1: ZFfXZrTmek4D7EjXu2yY", "Objective 2: B0El3BnZGh69SjIY9D6d", "Objective 3: AhvlK464Nh8nhyWxRarZ", "Objective 4: a1BNIjo9SQTeYBF4nneb", "Objective 5: 4UDQZ3PQt1rwk7ORNfpo" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "metasploit", "sqlmap", "burpsuite", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: tcTtI5K4kQRgMtVrBFhWDOPEAfAmOFsynhLne5avl4ERgClXjL0AJS3wLu5NLDex95zWC7PpiyNEsj8BTCnvmtjs1dLXu2hUPb6O3IJaT0UoD8vcvC44JHBtOi8ydbN1zv3qZgAYpzC239kMEZ4ePs", "expected_output": "Expected output 1: 1R0AwBAG94LIiacxOeEozA1T9nIaDa", "explanation": "Explanation 1: MYV...
HTB-9918
Penetration Testing Module 9918
Advanced
[ "Exploitation", "Enumeration", "Networking" ]
[ "Objective 1: tz7DzdFNV4GgsnQEi2oN", "Objective 2: EzdDfMkJmNxpI5wJmutA", "Objective 3: paE1cvKMCgiUlafNWTSK", "Objective 4: Z25D15vp5e0hfU3BxEMU", "Objective 5: Ga8O7iFsOQb316D4jolq" ]
{ "os": "Kali Linux", "tools": [ "john", "netcat", "gobuster", "burpsuite", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: D1ycIJGgMXsfY50q88GbMArFa0RcplZWcHTS5VvEwst4ADuRkSVtdCNpCr9GDi5L8QezTeJPYrYOAOQiCkUrxdiCSVYlQ84ex0iEdrRtskTAY01vouN9EnwFhrbH5uhXCwVkzxf6fBWEUIsUTVxtJ8", "expected_output": "Expected output 1: wh5waMfNTxKHCGZiioBmKgxj0OSuQ1", "explanation": "Explanation 1: ppl...
HTB-9919
Penetration Testing Module 9919
Fundamental
[ "Exploitation", "Reverse Engineering", "Enumeration" ]
[ "Objective 1: 07xqPJqUN0UukgUpJo2U", "Objective 2: eemH3S0UB35I86Qb29vq", "Objective 3: MzAm1lnsKvQJHEWqszKP", "Objective 4: 7tPXS2t7tpQZzvJKGnwQ", "Objective 5: uWB3DmEtmw8OeV45B4i0" ]
{ "os": "Kali Linux", "tools": [ "hydra", "wireshark", "sqlmap", "netcat", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: QvgLGfIdBBTedufZFL6c6KtCCU9kykIloYJ30ypRSzaDVqXgtFMWYK3Tz0vbImuqpuQ7hcNd4mPwh2PanOrtStoLYb0bD9hBvDDgp64TOmq2evQCCjHrzGUE0hByIh5U9TQVfcZ1bkeYcIFo66oI0s", "expected_output": "Expected output 1: pu9PLmqt03w2dIhYKQOQLdWZ0mOGxU", "explanation": "Explanation 1: aTn...
HTB-9920
Penetration Testing Module 9920
Fundamental
[ "Linux", "Networking", "Web" ]
[ "Objective 1: jVpr4tYisIObl62MqVlE", "Objective 2: OLbwBNAFLFY98344NFiw", "Objective 3: G5IyzeU24UuB0txyvUqb", "Objective 4: rUhgj5tmvrz32eE4QaqZ", "Objective 5: PNHcBjtajKQveFZIMw1c" ]
{ "os": "Windows Server 2019", "tools": [ "metasploit", "gobuster", "wireshark", "burpsuite", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: EiWgMsybyccEcoc6JciYbkddl7ojoU9gx2bRnHjxNM4arnzXQXcHykPWwM7cgT20JJpclmy1iGz2Nr5NxM6gltxGJLOzZEuvYGZntZc3oZWqrW8iSbkPfBqrDlBxkPvA7SZ6ux16pA7LRvjT3ws5u0", "expected_output": "Expected output 1: bBuC5h2KgJx5JbcJaJDRqxHfEAH9ZM", "explanation": "Explanation 1: GXe...
HTB-9921
Penetration Testing Module 9921
Advanced
[ "Reverse Engineering", "Linux", "Web" ]
[ "Objective 1: az2NN8ybnmYBcESsFAy1", "Objective 2: FQMZ4BsI4v4GoILvgGm1", "Objective 3: bKkUF2f41a9JYqR7eZfg", "Objective 4: QojhQeebMOQWm3PMYxet", "Objective 5: xhnqVii3PGlqzhi7yBlp" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "wireshark", "netcat", "gobuster", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: XaPVmly3k8gsIpEsYyoHbRCs3b2BxNxzS4uqBgOjJCoYfbXpUS9fkQgxepkudEuHdMKLZBHEY3wfCGkGUssRjLVoSwycopG6D8OzS6RXJQ2IKxlCMQFidJsUmi4kgEQzzOu7zsy4miUvdbF5eKzDpa", "expected_output": "Expected output 1: ISz8jEuqyCHhKyNrjehTM7VdRW9Kgk", "explanation": "Explanation 1: Twb...
HTB-9922
Penetration Testing Module 9922
Intermediate
[ "Privilege Escalation", "Enumeration", "Reverse Engineering" ]
[ "Objective 1: Xa9V96BF7M1j86PlRnhE", "Objective 2: xgnL0jLOpQcU6BewuixC", "Objective 3: uau4dMcWXQJ52X2kNc6T", "Objective 4: 42Z09DGHZVxP6kNFjMZH", "Objective 5: HXWPogOvCsHtF6WIwTRp" ]
{ "os": "Kali Linux", "tools": [ "netcat", "hydra", "nikto", "john", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 5vPTmDqa48sbNcPzUt666tryR6gqZbKEB3bDVhQcPlpTQPNmzcRKqJCwxvdpWNnG7aQrNmE8cO0WW1swYxtDhAn8mUbUTZaVEVa14fagBYoOmQ6o2BOXNnveimwpNw5vW39rSUU8heXurZkJh5Xkbe", "expected_output": "Expected output 1: 39ybtvhdHbVZSDOQVAsoIxDr5RYYhh", "explanation": "Explanation 1: L3V...
HTB-9923
Penetration Testing Module 9923
Intermediate
[ "Reverse Engineering", "Privilege Escalation", "Windows" ]
[ "Objective 1: QL55AnO3IQnudKqjYUew", "Objective 2: GX5qIbQhtUfKUfOk6VW8", "Objective 3: 6Mg1PY6wMBwHBOukFfvH", "Objective 4: Yxu2afA6vv8FwPQy6L8E", "Objective 5: QL6mRBnSEKDZVtdaJ8Vx" ]
{ "os": "Kali Linux", "tools": [ "gobuster", "wireshark", "burpsuite", "hydra", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: j8VhavqKeDrnpNEEA04RlpyuHsMNxfktdpCq1KEor40PEXV6qkXRh1e4ttNaunsglIeyMRpBjxtrPEbadBXNlrUkEmgdPKy02IyLMzvCwpy7qf6GTJNeVpv1mA2o7cH3jhu5Ce6qLuQpHnsnuWJrqc", "expected_output": "Expected output 1: zz671uFEzurnRjEXTARqGbPkmkbmOe", "explanation": "Explanation 1: Oc5...
HTB-9924
Penetration Testing Module 9924
Intermediate
[ "Scripting", "Web", "Networking" ]
[ "Objective 1: 6Tuuc2sFk4Ri8BRwVnHj", "Objective 2: NKdKDkQydU3HW7BbXbqh", "Objective 3: fTI7R0Wm3XTz5dCBDq36", "Objective 4: NyQDmqyiB9k7wYYmcMNq", "Objective 5: biU2U9Ww52dIfIQS0dSo" ]
{ "os": "Kali Linux", "tools": [ "sqlmap", "hydra", "gobuster", "nikto", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: Qk5DmK6pGDoqrwfe2DI8p8QHcmrTAkgnZhpsLtnUAd8IxueRK51pvuNTs9xHixFEl4t6evhB8e9u2DwhEwmZGIR48rCvdZcMVPz2PXEydHJBjLXA74vAznKOgMKNjBK2dwudFBdqKWZLNkCpZMjouc", "expected_output": "Expected output 1: 4C804hRCprbe5X21Bt2ynnLC9mFWOL", "explanation": "Explanation 1: oaE...
HTB-9925
Penetration Testing Module 9925
Intermediate
[ "Linux", "Scripting", "Privilege Escalation" ]
[ "Objective 1: PjqIVVDNNKU5DLq9Mej8", "Objective 2: mXCX4jCrOy3moBQKi2Uo", "Objective 3: nryxewgzjyCuA1CegWig", "Objective 4: NxB9XlOddLhsbRnHvgp1", "Objective 5: DxeSTic7fIMKr5XfmtRD" ]
{ "os": "Kali Linux", "tools": [ "netcat", "sqlmap", "nmap", "burpsuite", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: e91fdPTe5BU3cksB4BhUkU3YChy02nXCxzOQE4pQ83CcQIx8P5uWSvIglssMv01wiLlniWuQf5dwk6C3GGR9afXwW6t7FIGLOEpw26nTBdUpahv7fUepiYbJWZM2InG3R8pGqQNlPIvRg6DxBZycD9", "expected_output": "Expected output 1: AE3zEBYj7st3062VGY4avkLoXE9dya", "explanation": "Explanation 1: VZz...
HTB-9926
Penetration Testing Module 9926
Advanced
[ "Privilege Escalation", "Web", "Scripting" ]
[ "Objective 1: ApX1d94cQEjx0W9eQnnP", "Objective 2: PSEw5Dj02k87k4ZC34Sp", "Objective 3: mUA26H0jrqLFZeXiTRTZ", "Objective 4: BORmEImLQLyUzKWsRQL8", "Objective 5: rXQVAobCyNAy0gp0iYBj" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "netcat", "burpsuite", "wireshark", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: CQY5claW381Nt7I7qpC6bIXgqatQTIsvZ5ehz7fMmhtSP2TpXM9giEK3Fk1TFI0Xmz5baTjKfVV6gWAtuG1q0hXcSRoO76KkwMvSzRefNkXY0YiIpmWzNqr10GabLO0b72d4kWxcmX9QQJcPBZPjwA", "expected_output": "Expected output 1: M5925ccj1rvdrC8XtYaRzrBENw8BiC", "explanation": "Explanation 1: 3yG...
HTB-9927
Penetration Testing Module 9927
Intermediate
[ "Web", "Reverse Engineering", "Exploitation" ]
[ "Objective 1: R9e7997dcllMqvfOsxsN", "Objective 2: 0hawdmzAcPrsmp6FjAQW", "Objective 3: qGnbURYF46qHb6RigKKT", "Objective 4: wN3EyFSSszc4xLfwDG4A", "Objective 5: aOvJLP3dlcFGzhcr5Exh" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "john", "sqlmap", "burpsuite", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: mxt4yZipBvMJrgC9I6e0MjCuXMWXFeqhyQ7MzRdPaEA1fQUd7Y8X2CLocaNLoTUdhspE9fINd015DBZ2a736F4x4d9E0diqOAkM4AMRLJbMpTlQ9lo39clEt1kWKwMtpOE54ZYauXeDudAIUnGoTDC", "expected_output": "Expected output 1: 7FHnNP0ueyrZh8Tt01fGf27dhtwfXM", "explanation": "Explanation 1: Zww...
HTB-9928
Penetration Testing Module 9928
Intermediate
[ "Enumeration", "Privilege Escalation", "Windows" ]
[ "Objective 1: hBDurfTmm17Lu41Bw32g", "Objective 2: 1sJy8Qv0XdomQqxL5Prm", "Objective 3: dz6YNNz0KeMdelAYiD59", "Objective 4: RTwF727FScbG0MHEe0m2", "Objective 5: cEKT4J5VjyKqfzTZXV6h" ]
{ "os": "Kali Linux", "tools": [ "nikto", "burpsuite", "wireshark", "john", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: q1f2mEucT6a3JsZjLXZYBVWrID7e5W6UcTb27YQZYKmkUHlWDeJbqEp6HU1flLsONq28kuSxPO2TxlNysCx26D7PadCHetdxy3nPKXxH3MGiyLGT5TghRZGFRKD0PFewL5czdepfJkOpyb50DOYnFf", "expected_output": "Expected output 1: 7c308YvbhV8rg4KY6ozfWjmoFGQHNX", "explanation": "Explanation 1: 4Sp...
HTB-9929
Penetration Testing Module 9929
Intermediate
[ "Web", "Networking", "Reverse Engineering" ]
[ "Objective 1: hKZZe0XOo6kAHdW7m0eY", "Objective 2: toL6s48II4LTI2FkKztg", "Objective 3: Z6ZslpPgV53d5DFI6sbt", "Objective 4: kYFPMvyq2vBodpQN2LcB", "Objective 5: TTksu1KTR9353p3GoDqK" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "metasploit", "netcat", "burpsuite", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: hMAacZ1QWpYxDk6o9Jnvjb8oxJ7rnQK2yl4XhChIorRpickJmsBPZ1dOLSUA428KN5XXCYcYGBclKIDLMtCVw9Dj4hJcy1BLguQeVbn7o33llnTEULi4U4lZrMivPiEjrGmHNzNGKoxcQt1hR7Sxe2", "expected_output": "Expected output 1: 0nDX7Dy9Cb2tyXkGtMaqrwjwxEbmMj", "explanation": "Explanation 1: rXe...
HTB-9930
Penetration Testing Module 9930
Fundamental
[ "Exploitation", "Networking", "Scripting" ]
[ "Objective 1: xj7Teo5U369QOzNm0FNy", "Objective 2: qMORQa6qbIPM3cuVwZij", "Objective 3: yZrAcdadqfiM6FUvurcS", "Objective 4: bNZ4khu1JqvvKCLTw5Sd", "Objective 5: 4Wa1zp5h24ce9Yw5alKp" ]
{ "os": "Ubuntu 20.04", "tools": [ "sqlmap", "netcat", "nmap", "gobuster", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: GEdnpEo8cjWv6Xi3f2TYGUPPTYXO6lWMHeX5TgC8z7dcIXQrnvNyZehGKNQeXcsJuaxToPcjTxhyHDFY2iAaTXN2yIHxIUWKrrhnCzGTzDCmH9VSkgVTZu6jmlB6U6zW41Q010Goxg2wlLH9BF5Dk5", "expected_output": "Expected output 1: qH4TJvTzVFjXbZO3zdS1f8eh7gguD4", "explanation": "Explanation 1: ISG...
HTB-9931
Penetration Testing Module 9931
Advanced
[ "Networking", "Exploitation", "Enumeration" ]
[ "Objective 1: nCPsVQXPLNv5vWIM7i8w", "Objective 2: mGwzb9TctxklaM9wqnZP", "Objective 3: qycDYBmg1aoni0ayh8R8", "Objective 4: sTWWQNqh9MZO7AMuQ9td", "Objective 5: 60VN44jeTpOETvEzDJfd" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "nikto", "wireshark", "john", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: PJc740FuCdQCKXgnqeJ96JqIL6axLvZUGejeJqbcC4EGXJicqIBHamCrxUgPGmmIg0fjKApA3gG5csRhzsDhJ4OnO9JThegKxjp7PwzVyFuQs6BwHpxYcwVD00AlS9p9aNerpSBK7iSvgpMS0EY7W7", "expected_output": "Expected output 1: COzEdTnB6skoWF13HfAcMkuiC8HNpU", "explanation": "Explanation 1: YwT...
HTB-9932
Penetration Testing Module 9932
Fundamental
[ "Networking", "Privilege Escalation", "Linux" ]
[ "Objective 1: wCmtFeqwDTsbwEoDypbh", "Objective 2: C9td1BbFgDIjUEOhmOhi", "Objective 3: 9lqIwTXSGCQy8iK4cgQ7", "Objective 4: y4OPvbqsCzUpVl89Nz7m", "Objective 5: kV3UiZGkg9kV1zOBax5O" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "netcat", "wireshark", "john", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: vEoOjI1gPuh7bAK6z7azO7QoZHtmORusrRlHkDGDkAwIdRMlFgVygfozfsUPwab62InF1q0C7IfnNU7brjfa3jtvSO5WyRvm66hp32SOiQY1zugqHCEvBPRkJ2d4pTnVSMIa7mb0lsPn33tAKx03Xy", "expected_output": "Expected output 1: k8B0F9VymRxViR9mtKyEIdB3aR0EDL", "explanation": "Explanation 1: 22U...
HTB-9933
Penetration Testing Module 9933
Advanced
[ "Reverse Engineering", "Web", "Enumeration" ]
[ "Objective 1: Vvx1FRSBsh3vgpcYvLKU", "Objective 2: DnQ5PFlwQ28yWMEzbRAN", "Objective 3: rlY0tHrBZV9VabGY5k6V", "Objective 4: LxJFyJJRPYA3Sy2J2iup", "Objective 5: xCpChY956VXqCeyfhG4d" ]
{ "os": "Kali Linux", "tools": [ "hydra", "sqlmap", "gobuster", "wireshark", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: IlReRIgoszMSqA3zfwOsNWxeWdOcPukwyO7e4qjnYZmFfqf13kCSTNkvBeeSfNbpZUjtGyxPv8wqWXKHCcHLSsf1XhIYn0ox89MHAV8R98QW1WxfQZKfQJYYCxQW4eZvhJKwOOmHPjLOqEbNLPr2TH", "expected_output": "Expected output 1: vahDWYHk3JNMOtb31TfzXkJPGaMKjx", "explanation": "Explanation 1: YrA...
HTB-9934
Penetration Testing Module 9934
Intermediate
[ "Linux", "Reverse Engineering", "Windows" ]
[ "Objective 1: KwtVtL2Bid9BXX8NfI6m", "Objective 2: ICjVrYCDDZIuKZvz99wq", "Objective 3: Wv3J2Xzscc9Aas9SU8m9", "Objective 4: PgpPbrdCW7znWVsNn9XE", "Objective 5: DBNG1DAC8wKzNMi8wRfK" ]
{ "os": "Ubuntu 20.04", "tools": [ "hydra", "gobuster", "burpsuite", "sqlmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 5DeF40oF6di2bko07fXZhubBUfJHyLFiPUWWZma6GQfzLJv0GDTxLPmEijXei7QMLw5Ko6VUFmmPXOSdEgoPhiotwzi2ETBgwi6Zppicaczk9ZxPf3oA46MhgePg2F361lQrdjqzwz2JOpQvnUqVOa", "expected_output": "Expected output 1: ZzyC2a8jmvSAGh4cDhPvl1okkpyaqY", "explanation": "Explanation 1: 8Tu...
HTB-9935
Penetration Testing Module 9935
Advanced
[ "Exploitation", "Linux", "Reverse Engineering" ]
[ "Objective 1: znEARxxGqt4QjybHRsu6", "Objective 2: fFKOXqI5hwiVF2cakNJd", "Objective 3: DFnGnYhr0SIfoo5qSd0P", "Objective 4: JvIRgr4U9GWpBI1MX6Wa", "Objective 5: cJ9tTx8Q8DEApcnSmdkM" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "hydra", "sqlmap", "burpsuite", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: 6aoGJubU7aF4Jk8m9mHCGiLzP3OKyyh5fYSfSyxbNnW6k68HO2IYJ8TzDfbxDPtVpuT6MHex4v4u4uEYk5Rxzb0GNhYsLZ5D8VnKKvvp91tYdTgXaNQLkvl2FWI7WuELZhkSsUYFh2wbrT3XAVVgVl", "expected_output": "Expected output 1: eyWymLQvV4FnsNPml2PY7Q8VxO5aHJ", "explanation": "Explanation 1: v21...
HTB-9936
Penetration Testing Module 9936
Fundamental
[ "Exploitation", "Reverse Engineering", "Web" ]
[ "Objective 1: 5yfbIFSzx0qcknoso1C4", "Objective 2: hxDdHsmaVia91SxaHWnP", "Objective 3: yHaoyQkr9yPbC8MhjLUU", "Objective 4: v2jIsPdUmN1YopDpvOSC", "Objective 5: 948xsO4tIcqBS4OcAJbB" ]
{ "os": "Kali Linux", "tools": [ "john", "sqlmap", "burpsuite", "gobuster", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 2YQhQ8IC5C3SuO6KOertYeLc20c40AqfgWRs4FAPv4rdyBkxtNrWFwKy5RbAErfO50XYSDdm5i48zpLaZlZVUKRsSxl7HO00VjozgRp8pjmtdQ1Viwqg1iZ5tkoZtMh9DEzYPEGm3UzNbjCdJ1yoi4", "expected_output": "Expected output 1: NcopjWS62swTUJq1YdUSGbaj0GTlmG", "explanation": "Explanation 1: vJq...
HTB-9937
Penetration Testing Module 9937
Fundamental
[ "Enumeration", "Networking", "Privilege Escalation" ]
[ "Objective 1: LTqxv5Z43b7Xj0ESPFzY", "Objective 2: bQbAdCmzl7AI3yTdApeV", "Objective 3: XKmiFoGA4uqlyULnB88D", "Objective 4: 1fvdVERPJz3MD0ztlfG0", "Objective 5: 0viGew7gBdSzxSBQqAjH" ]
{ "os": "Windows Server 2019", "tools": [ "netcat", "sqlmap", "gobuster", "hydra", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: 0MpEwOQ7xGspkW4BYORslVZDyhYfcJeYx3ddw2rH85k8h0DHcwFyeOpfXa1B60tLvPlbK2eIApgYLNcdQ9U7B1b5kazt6XT2rFmWjNc2vqleam6tp1hIh7UIpWzm26sdFZnqcvXLPjvOirGAJCzz1V", "expected_output": "Expected output 1: PcB7oTqaYClfKb2zEvJzyQM0pKLPlY", "explanation": "Explanation 1: rAV...
HTB-9938
Penetration Testing Module 9938
Advanced
[ "Networking", "Privilege Escalation", "Exploitation" ]
[ "Objective 1: fHwsmQYRD9q27hY7jf3J", "Objective 2: E2vj4PpAPeGldURsO6u5", "Objective 3: Vq5E278aT3GxyrjEm8b8", "Objective 4: KKjTi3pnDa8mMDe6eaFI", "Objective 5: Yq8L1p9wfLxXWh81kquv" ]
{ "os": "Windows Server 2019", "tools": [ "john", "hydra", "burpsuite", "nikto", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: QIgl5QRXQuVujDb6d9byPq7DM9AYCekavyCFOPklklld6KKyjRafYS6FbdgZU06XViCw8cSVwsFvjnRNeGxg8HytaoNNzcQQ2PiYeavNCr8pWicSGDD0XB0HczXXknNfwWobzryECelZzeHnSInbvz", "expected_output": "Expected output 1: wjzBZwT3CTzH2XSxOvGPFy2gZrjEr3", "explanation": "Explanation 1: 8jp...
HTB-9939
Penetration Testing Module 9939
Fundamental
[ "Reverse Engineering", "Networking", "Scripting" ]
[ "Objective 1: aTcC32vwfYSiqqBpx2vi", "Objective 2: JxCJVLvYLsH8OkT7hUtd", "Objective 3: OQ47EGyHQtL6BC7CBHDP", "Objective 4: NpYhzswmnZEzyIvC1XUj", "Objective 5: bJP38lVUsFLLejVXP3Bk" ]
{ "os": "Ubuntu 20.04", "tools": [ "hydra", "nmap", "metasploit", "netcat", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: OmleV7exZHPTAFvQq4JfyNlNrd5sWPtXOkt6fncjaF67j4fi4zpPVjcevcMtHNKUzSxtuhuO5NA7KKkiRlJl5RfCMb3b8M8PG13C1cA1kn2p8Hb59eMIsfwJoHKmtoiY13oOmG1LFJjyCi1Nu2mH53", "expected_output": "Expected output 1: 5aRnAvhX8zA1rZQLgH01GxhDFnmrYo", "explanation": "Explanation 1: PV0...
HTB-9940
Penetration Testing Module 9940
Intermediate
[ "Privilege Escalation", "Web", "Scripting" ]
[ "Objective 1: l7TiYYQn8LHQ76hHLie4", "Objective 2: YAjd35x5t6qFxpZ6fnIs", "Objective 3: 369lHYXySp6tfZQlAwlD", "Objective 4: kkLu3uZ6JwZZBPmIrWba", "Objective 5: s7pGY5S77f96BQiDVJ70" ]
{ "os": "Windows Server 2019", "tools": [ "nikto", "metasploit", "gobuster", "hydra", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: tRi7YoWa2cuA3GYsZd0ts8CywA8Rl8h9SrmrRcLy78tcNqSvNGITYie3OHdW4DzmJDuOj2mhpLtsVCrM6dXzCuq6SKN4jUV87ietsDketJrVAQjEZbnPwW80BrQbkAlidArTzyXQeHgHt2BRd1rVrb", "expected_output": "Expected output 1: uzh9jLn9nAayEw3AsKLrdyqCE3Bb4i", "explanation": "Explanation 1: lbe...
HTB-9941
Penetration Testing Module 9941
Advanced
[ "Linux", "Reverse Engineering", "Windows" ]
[ "Objective 1: uv1KtdHl3bU0xsdLETp5", "Objective 2: 1DrbPtsNFD4XeuWjDdNI", "Objective 3: nxMfCvsNCQT7x3ZfT80W", "Objective 4: vtAuOBe5AC2HMpJpujau", "Objective 5: 91BCtiZg6rQ7EqaeMxZO" ]
{ "os": "Windows Server 2019", "tools": [ "john", "netcat", "sqlmap", "burpsuite", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: EYPM3b4ipquaCgINDMhjXFcWwSs7Uggx9w4X9ygsfMfOm3KUECYKezRqiqNAoNTLIDuFGnTkVBumUeLophmhx29veFJaLX6BjjJwgnG9hbtvyAqzeHn4V54K0Pv9AEQ30YdVAKBIJxcp8EtG2euFdK", "expected_output": "Expected output 1: PkmtlvlpxzQBE6ehLdouFkJmT4Frnx", "explanation": "Explanation 1: fWW...
HTB-9942
Penetration Testing Module 9942
Fundamental
[ "Windows", "Enumeration", "Linux" ]
[ "Objective 1: 6rUBTRtOpOAZ46W9gQjQ", "Objective 2: 0hHGI31lA51abwVTaJv3", "Objective 3: nL0M2IkmiDDTHF85BtjX", "Objective 4: NZnJ5x1F5xRUUoyCSbEU", "Objective 5: tHzfTix7wRmiMVvspN4y" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "netcat", "john", "nmap", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: 1nsXzhovry9MGeVw2BV7s1HtgaN0iyj05fK272sEFLD2D96OFsYptUT2w64CmUHGKcbFViN9xbQpokCqePiczg7ypdmHZdZBv6vSx781hlaShsJeaBekYAUbhLSHyiCKcvkBDBSoz9EBLqF7qBpp98", "expected_output": "Expected output 1: 0dEm3CC0FkWuccaiYESOXJC7LXz30U", "explanation": "Explanation 1: KaF...
HTB-9943
Penetration Testing Module 9943
Fundamental
[ "Linux", "Windows", "Enumeration" ]
[ "Objective 1: EGniJmI8kecuc4dxLb2N", "Objective 2: 19FvHXu3801FLfj6enLx", "Objective 3: YOjgILi2jM0mghmnBZyX", "Objective 4: ThzTIFovUMO0ZBuMdgYY", "Objective 5: DkIyzqeyHzhbxUt855DK" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "hydra", "nmap", "netcat", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: JnvxASeyqFnfSgyzH5fGDGLXNRg5xnsOtdaQreM8rF8gZyLGUaXdYJH3kvxgx2F01C5AtclbncHcyhLMl4zWcE6iMWlOTJedqDiVDYyoEsghVvhLKldKcl4F8SjUXPktxMVLRvzIBF3cjnznmfKp2f", "expected_output": "Expected output 1: rxad2kRYffcKxdzXv1PLVLDUE6Yzq3", "explanation": "Explanation 1: vmq...
HTB-9944
Penetration Testing Module 9944
Advanced
[ "Privilege Escalation", "Web", "Scripting" ]
[ "Objective 1: jRmnAhnN055Uy6lsSy7L", "Objective 2: aYHib8Gg98dK59qSq5fA", "Objective 3: Vzpbdkf63vxtoS85kD3E", "Objective 4: 6NsSPPMABNS7OBkrhh9T", "Objective 5: 6JlV7imbbaTGSvDfZ5Dj" ]
{ "os": "Kali Linux", "tools": [ "john", "nmap", "sqlmap", "metasploit", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: Jg18uFQ28XnAa47zfayfz6NBbUx7NIW4ttaFqEWO8J1UVp4LPDiiog4DnleaWcUKNNsd2IeM7aKMhfqdaO2fsMGR6cIwk6Bvf1aDQxVwPSMI3NKVK9UWV2YbO1t5iCAChuQgCo3h9MwAIjepcCbBlw", "expected_output": "Expected output 1: q8HBQdIRyQt3lMaYYJhQz2HB30Tm6b", "explanation": "Explanation 1: lcy...
HTB-9945
Penetration Testing Module 9945
Intermediate
[ "Exploitation", "Networking", "Scripting" ]
[ "Objective 1: rMIvMmklEYvigzdaG6lb", "Objective 2: VDiOsGC9j3Wj0QkoujQw", "Objective 3: buIzuw8cEIkdjkujCvhQ", "Objective 4: vFvL9hJtJ12iIiFAH6HF", "Objective 5: AuUmoaZ7x4J7sTYoMLzJ" ]
{ "os": "Kali Linux", "tools": [ "hydra", "netcat", "wireshark", "sqlmap", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: AddWnPiUe3SSqYxEwYMQDD8an80QXMnMmiMarssf9RuKOQroMMecYPZu0WZS118KZ9uyCoPap6s1Zj0w3OGI73BEvEnekMzVtCZL3kNeZ1B0wyhmfqvjrhscBrM88CnVyp3NFARdhjtFAiF6uh2us6", "expected_output": "Expected output 1: Z2MmIS9Zg1TkRdWeSOvYRYKDFx7u9s", "explanation": "Explanation 1: PCf...
HTB-9946
Penetration Testing Module 9946
Intermediate
[ "Windows", "Exploitation", "Networking" ]
[ "Objective 1: exmvRPfBovvc4pR6FJi1", "Objective 2: BzyMygOBJU9TGyqPFSwX", "Objective 3: WgS6OlyH31jFewUVmvQS", "Objective 4: xa17NpbJoeHRfwMTdFd2", "Objective 5: 5juYJ49OAmdeTTE6uqmW" ]
{ "os": "Kali Linux", "tools": [ "nikto", "sqlmap", "burpsuite", "nmap", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: doOK8vhxpTZ2LTLiaBdTc7ol8r2zASSJLIQooqrizDt0WqzAXiRTURjBLKuG4CtjsiBoxJIf7G1EkLrqRaye21I9wptABjLEvqzEg4FTLKeG44Id2FW8pXNjb4b7K5YDXy5vc8IVcOdBszU0ETzXqT", "expected_output": "Expected output 1: upZLaE3uIDKdz76E4PsRu4wIDm4ojH", "explanation": "Explanation 1: fr2...
HTB-9947
Penetration Testing Module 9947
Fundamental
[ "Windows", "Enumeration", "Exploitation" ]
[ "Objective 1: ypYPpqabgqtGtSrEKZG0", "Objective 2: SAPlXJQtegoRFIOe2AFT", "Objective 3: Bb8Uk2l7od5HcXINSSss", "Objective 4: UQXJzzNt5xZ5AxPcI3a9", "Objective 5: gwUmVrBuaVBndHpkwWOQ" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "nmap", "netcat", "nikto", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: j1Cf0cEyaVRfEyYdpMEPBMdJhtM6OxTeQ099VxcflxcHLveXrg6XL5u34O15ICXuLY6q3r0e5flzw5y0jtcJiBaBfY6gD0xXIuQc7PluAmP2GnIOxmTR70V3vBEUKJityQl4s1ATDuCILnQL3z7GTI", "expected_output": "Expected output 1: Ms3bGDSzMo1iKPzXZBDR6viybQVqxB", "explanation": "Explanation 1: Dn4...
HTB-9948
Penetration Testing Module 9948
Fundamental
[ "Exploitation", "Networking", "Windows" ]
[ "Objective 1: C2aKqaPPsHREJD7c5zZ4", "Objective 2: GhnUT4VudaKzvYyje0F1", "Objective 3: l94Q8Z3x9FDuP7kviBft", "Objective 4: qmx5I4mXlw9sf10qHXiC", "Objective 5: cggPSNZjpNj9Ta5mLNtM" ]
{ "os": "Kali Linux", "tools": [ "wireshark", "gobuster", "netcat", "sqlmap", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: gPS1uG19rarMZnuYSBHgsvHueKJ9fgamKBLfVxtceXxn7IAb6owmEHrEiJXZKPdAHIBdCeHJDwirX0aKRAsF5F3NdVQqj6p2fLCKU5vZ7MPt6PxwcySHzWnksZbuY318chLw7JJhPJYRlS26UJL1Vj", "expected_output": "Expected output 1: CE1anmmcV7JHxizQTUBvIiuAD2dbOb", "explanation": "Explanation 1: q0v...
HTB-9949
Penetration Testing Module 9949
Fundamental
[ "Linux", "Privilege Escalation", "Windows" ]
[ "Objective 1: 7b9AUQXg7YewGAzNjlSG", "Objective 2: FWGHBIsJTfSuv3j1Gay6", "Objective 3: e5J7I6xrQ8XpPrjCPisL", "Objective 4: 0g8XCk6ukxBuBH5OAoSH", "Objective 5: 2smX6q2NFvuaFGB21b1R" ]
{ "os": "Kali Linux", "tools": [ "hydra", "nikto", "sqlmap", "burpsuite", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: Wcn3JFgOC9I3e2dLYJ11q1OEFn9dmQnL5w9WVmRx4efM2CnTqCtZUxmnt8Awk3D7bfAddyphM7XiGvPfDYguC6OKleZ6jPXl1vl8rKU9xOAaeVgTZqwmV7F8sV8MsaJZ3xcrMFLZsVRuMDIJaTfvF3", "expected_output": "Expected output 1: mc2z8dtcwWw34RUJFVUoBxGjiSMDvF", "explanation": "Explanation 1: g5C...
HTB-9950
Penetration Testing Module 9950
Fundamental
[ "Privilege Escalation", "Windows", "Reverse Engineering" ]
[ "Objective 1: zoWmXc2X03PNFzxPmkFS", "Objective 2: JqHko0PbNVthIvVvoTIa", "Objective 3: LoftUob6v4Cy0hw71o4q", "Objective 4: gnZVTghtyCLoav0CgYVq", "Objective 5: xGD4DTtGZhR6QHeof0g1" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "john", "netcat", "metasploit", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: t8lnf6fq1GkyloZnjbmXqpOgCEM0abKxS7VOC3xqhN9NpVauR7RwpqQpBsPpmJM19Cgxq9jlBUc8RSc7F7AdzmMU4w5ZXhyWmbCMoycyFlEsOuW7r7m8L9HDCTNmrsW6Hkae6dEELp8d7g2M3S0MnC", "expected_output": "Expected output 1: zHEkgT90Sv7xI5tUNNRZQg9gXiLPST", "explanation": "Explanation 1: uhx...
HTB-9951
Penetration Testing Module 9951
Advanced
[ "Reverse Engineering", "Scripting", "Networking" ]
[ "Objective 1: CI4FwMuv5s0nUpTzjPbq", "Objective 2: orWPk8eKvVTA61ETOIbh", "Objective 3: fnrExtX3HfsaLCkm8T6Z", "Objective 4: CcoGk3O6wI0ftRXJJUnT", "Objective 5: MgHcMuAdgj611GvwQTZO" ]
{ "os": "Kali Linux", "tools": [ "hydra", "gobuster", "netcat", "burpsuite", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: Axsg7QUXUxbwPfLxlP8WiRnwdZMhh1H4MaAHTxuOSIVzrqjZtj3KvzYnv9jewWhCtFU46H2Ng2vfU01kZ2lfe0w6BYWhf6TQxaB6WSKdyipoViRWeIQmYbXaub7pzxyz4mLDs6ntuNRWRTGpzeNBxp", "expected_output": "Expected output 1: VQOMqR03IYvDaS5N86whnVl4nZWx81", "explanation": "Explanation 1: z8d...
HTB-9952
Penetration Testing Module 9952
Intermediate
[ "Windows", "Exploitation", "Web" ]
[ "Objective 1: 8gkPvZJxWf5hjxRdu9Vq", "Objective 2: 3SUL2wCZ21kYRI9fYaGi", "Objective 3: swBGcSypWwn3x313I6gr", "Objective 4: HVT4sC8qKmJYPxHBHuof", "Objective 5: hMA1VkQgS4MeBW3DwDDj" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "burpsuite", "gobuster", "sqlmap", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: 5ISKRmuGXTA5G15IFuAtvHiEN0doSb9QmZhXjZxoGjveNbhklisjSAnQmnJE2LahvEbljsKDmDqSBtSUISoJ6JEsN9zp1XPASBjkaG28kyj1KhZTePuu923K8uuL1vJ3L8q5ZE3SjvpZb97NALJDjk", "expected_output": "Expected output 1: 10Iny2mWjExGBK8MYmDNMHhZ7h0DDl", "explanation": "Explanation 1: Vz6...
HTB-9953
Penetration Testing Module 9953
Advanced
[ "Scripting", "Windows", "Enumeration" ]
[ "Objective 1: pyO62Fkef7OqHa4bBQGD", "Objective 2: se45HxRsLiOjGgYqAn7f", "Objective 3: ATGqYmApqWhrMvUqo1ry", "Objective 4: bVGYYsRJIbBXiQE9LRqW", "Objective 5: Iy7QSvk8b8OA3RxDSlVG" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "nikto", "burpsuite", "john", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: eevqCN9luqD4mcZj2gmkzyLu9OhqfK1wgclI6pifB4JF2coTpTaU1KlxVXIy08UGUVIJKy4d8mu8TC5LG0YQtwwl50yMBSX3IsHQVTUGBwpAC9qKYcXTI7bBsyYoKsKTTWC2WMsghS9nIO8mo5Mibk", "expected_output": "Expected output 1: y6FN5655T4wZgYBF4g9vKrS0SFF1SK", "explanation": "Explanation 1: XDp...
HTB-9954
Penetration Testing Module 9954
Intermediate
[ "Windows", "Privilege Escalation", "Web" ]
[ "Objective 1: 38lHGf359nqdnYVGB3Jb", "Objective 2: EHLwF61o9APwqyw8JNj9", "Objective 3: Zz9iSmAoH3uaql6PipG1", "Objective 4: KIvm78SmAgHTb9qrMFLE", "Objective 5: LSOrOnZaOFpq7y3CYuZy" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "wireshark", "hydra", "nmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: nauAeRkeSAUtKfqUemxbrAlnV6dX3iKFJXrXe4j8eeV7wEDlCZFOtUuskLUKjvomS1OoWMG3rB7JRrGsqEOPgMBHkRTOqo3c87Lcl9PJrL2feC9T90RNS3bxNJ7t8jfPgiM04qhWP8UvYZWzXVcKeX", "expected_output": "Expected output 1: 6V16UHUyPu6rsm4M02fBqOqaTltBRR", "explanation": "Explanation 1: qnk...
HTB-9955
Penetration Testing Module 9955
Advanced
[ "Reverse Engineering", "Privilege Escalation", "Scripting" ]
[ "Objective 1: ovuszspLE9IZyNaT4YdZ", "Objective 2: Q341CxbapdHNq8RzQDzX", "Objective 3: xN4p684qqcMvs33vwIKL", "Objective 4: KxOafpvBjR579cYrK6eK", "Objective 5: WhKbopmHTbUuMbTJXGrP" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "nikto", "metasploit", "john", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: l6thlMW0KrCtIGqyhwEN9j3I8x2T18o0ZTRwEbQS3HGfjSm3IfQwhxFm8XmxE5T1v5IZ2XMJANu4PlfPynvnYvCM6dwAHDmjWg1WFseVNuDF2AWhqSnECy62LEUKuLr8DjhCCeLFGp6sx7tTSu7c9R", "expected_output": "Expected output 1: 1aksSflfPa2oKgtRJGuZtJjmS4YRg9", "explanation": "Explanation 1: XhA...
HTB-9956
Penetration Testing Module 9956
Fundamental
[ "Privilege Escalation", "Reverse Engineering", "Windows" ]
[ "Objective 1: eXkgnuXy2QYPR01n69kD", "Objective 2: BEzLx9ttHfZBQZJqb308", "Objective 3: jnE4iLqVsuPYQb7gBLt7", "Objective 4: 9ZsAelJR7K15KWuPT6fc", "Objective 5: 2KN0d2lkjGYHYqS9Ymr6" ]
{ "os": "Windows Server 2019", "tools": [ "nmap", "wireshark", "hydra", "john", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: omdxhsJQtX7lEU9SiWmCIYWFllzFWhnBvCLYwpixiDNMABJUCOR6FXxPD4cNPSUL7niH306IAYbmJqF4NFAff1W41eETq9ldJoOEfIiohHyml9IX3BfGctFBsMyVyISlQ3ZvooFRnZjBJGCNGLyITt", "expected_output": "Expected output 1: D8zUs9DMtMi2OLhQTgnL1onNgKV82Y", "explanation": "Explanation 1: CId...
HTB-9957
Penetration Testing Module 9957
Fundamental
[ "Scripting", "Linux", "Web" ]
[ "Objective 1: GzKAYBOB4hURthBZgj98", "Objective 2: eTwKga7uq85MxvdEQY6A", "Objective 3: 8sovm8tfhNLoBYBtbS7v", "Objective 4: v8YWrOSbadn8fOiF1RtW", "Objective 5: VrzGnRtuHErdcGgVJ5Nv" ]
{ "os": "Windows Server 2019", "tools": [ "john", "netcat", "burpsuite", "nikto", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: MavMQKxh1rZXuBZTPxCfP9d415EUiKM42SY7RGgY3WEk7wXJZFC8AmqrGZrvDALc1ffefNMJob9NESORA8HvOTXZLafnLj6xf3ABg6qrSab3hsa7veT8lYXaKImKSHMAtQ0nrN7ChZiQSdj4vQpPj7", "expected_output": "Expected output 1: KiQxL7E2RDl3BT6LgjAkZYyMqmnyVv", "explanation": "Explanation 1: PL9...
HTB-9958
Penetration Testing Module 9958
Advanced
[ "Exploitation", "Scripting", "Reverse Engineering" ]
[ "Objective 1: aVcdf0mT9D1EPvDcjuM4", "Objective 2: tOY8EYHVMz7uBj9CP7qg", "Objective 3: c72SdEiGq3bPc3VLa0i1", "Objective 4: I1iWl8zxeFqewjrkfOmb", "Objective 5: coC6Gk3sZ3reQ1iS42SH" ]
{ "os": "Kali Linux", "tools": [ "nmap", "nikto", "netcat", "metasploit", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: qwF4oZnTTVdclZxj0lHVFUmQALtjWarjE8vgtcRro1qFgI7Sc3TNPVd8AIcXi8Z8pAVqdN7VXVdRREM6v8sPHoMd7lNq8nDhO8UrfUPw4681H9UjNWWpIK8sz8XsiQCwgrIzUJHoeOVUaUV29ZuPgH", "expected_output": "Expected output 1: TQ7kTWeZaZKbPlTzNYTX6MkaJA7SyN", "explanation": "Explanation 1: mGJ...
HTB-9959
Penetration Testing Module 9959
Intermediate
[ "Networking", "Reverse Engineering", "Scripting" ]
[ "Objective 1: zdAzSR3ZXWMAXKeNPPZ2", "Objective 2: ybQVc0VfBOhFrW6urCFs", "Objective 3: h6fZrIp6nTcozAhUNZRJ", "Objective 4: 4r1S7jeQjRsBCNg4FOC3", "Objective 5: Rb7xK0jx1dQnFmrkpoXT" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "burpsuite", "hydra", "metasploit", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: NhDuAR9QNNaAjfAWvLpds1jkEiFNBOwAScNumZYshhijFfECRngZnLiShUTdk4JLsk4p3LML2y7KwLDXpSwTr6QMERG0FUtrbubOsNIELK1lAJEkAaWMA7HjPKZaN1PX1jNQ3Tv2tToZRBgiCFLI0u", "expected_output": "Expected output 1: J14DPFKCJBrfN9vvmd6gJyYftltDQb", "explanation": "Explanation 1: WRV...
HTB-9960
Penetration Testing Module 9960
Advanced
[ "Web", "Windows", "Privilege Escalation" ]
[ "Objective 1: 66klc0Y5eXogDOTlxb8q", "Objective 2: 3RMGANZUkfsUxfdLMots", "Objective 3: N9Vy3hajOqPsLlIDDr8l", "Objective 4: EUBVOnozs58yCHa2KR2F", "Objective 5: oeNEcskQy9V4LVE2AHzy" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "nikto", "john", "sqlmap", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: lVQ53c6KW8LpNlz41guLDVk89skRVi2y7k6gI50LchJqIcJ5Jde4p3VXUQMX2VriUV83f3UBI9uVjIVeLwJa08kyHUzSZoNC7RjsnRcLXzeMKwqWZj4xkhsT3DCpbiYjqO1JvJfYbQYgzO9MIG7JOD", "expected_output": "Expected output 1: BT6PZfoMCpKumGZ18OhhR4mOnKTAE9", "explanation": "Explanation 1: SQh...
HTB-9961
Penetration Testing Module 9961
Intermediate
[ "Web", "Scripting", "Windows" ]
[ "Objective 1: JQxQ3aSgLUPBCsXNPhJN", "Objective 2: eLOi2PZpmSAJyfGIYPuQ", "Objective 3: YFBhMsuHDohvrutE6MsN", "Objective 4: YYqL0Go0y5Jfao5vbf3g", "Objective 5: 6drplv5hptE89I3k8pu6" ]
{ "os": "Kali Linux", "tools": [ "nikto", "john", "netcat", "sqlmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: v3tY3iPq1aWNAC41CSr02kigix2RXOsVaSrWroOjb83ajgtw1M1Z0texOm5zT3jFI709bOdDsdRdEPYnhyuHsMdRpifN7mdmFZpVuLG8wE3iZZt8oVWVqFul2V4oEVF1dBU2yDFttmQwt7VoK4bcYG", "expected_output": "Expected output 1: VmXQfnzZ4lKg2qIAkYTKRUAo6mnsa3", "explanation": "Explanation 1: wTf...
HTB-9962
Penetration Testing Module 9962
Fundamental
[ "Windows", "Linux", "Scripting" ]
[ "Objective 1: a7sHmm8eRN6R1shXB6SA", "Objective 2: gPjjHIi1F2o7GItFlQtL", "Objective 3: 2P0MctDCJmt73T7v9jpQ", "Objective 4: TFXp1QHRm2TPhqIla204", "Objective 5: m2PdG503bWlCJQbKPl2W" ]
{ "os": "Kali Linux", "tools": [ "sqlmap", "hydra", "netcat", "metasploit", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: 43loeF0sylvE5fyCuHPDS4JFa00MkGKq92aKvKJMjlIReeYd3A8s5X3HcaZGs81nZJd84T0BUo0PiIbRbGa11pGvZL6TlmsvMnUjAdMg0qlvBmJFZUdIfSMjQDRCKc5rA4mtv9Qle3VoqsFpWA7L6L", "expected_output": "Expected output 1: QR5psUBoiGsNTvSQBxaYG3hxFppDWs", "explanation": "Explanation 1: PSW...
HTB-9963
Penetration Testing Module 9963
Fundamental
[ "Privilege Escalation", "Enumeration", "Networking" ]
[ "Objective 1: 3SQ8nKyko9QNfrc75oyH", "Objective 2: OcrMPEfYJ5btMbojy19N", "Objective 3: NQGVEcOHCznXUSItur9N", "Objective 4: CkOa4HR1WvfrSRawF4jk", "Objective 5: Cih2oTZRm68QbVeDRF0P" ]
{ "os": "Windows Server 2019", "tools": [ "hydra", "burpsuite", "nmap", "metasploit", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: yq4P9q5qmbVmkA2clKKh84vfum1mDD5l4EBBqDDXjB9TiXTs8e4GwUGrd4Nc9Hj0z4i3LlxwZGRYHo39omR2UXJ2iEPsOoiJGOpuSfUv28yRwAxPkyo9goFTz8muCXRelr2U2CgBzw4vGDw4Vk7jNZ", "expected_output": "Expected output 1: RiROG0GGdV79erfAxXb91gIwg1Joym", "explanation": "Explanation 1: oww...
HTB-9964
Penetration Testing Module 9964
Advanced
[ "Reverse Engineering", "Windows", "Linux" ]
[ "Objective 1: 8Kh3WK4eBrip351YVGCn", "Objective 2: WozIM3G0AKHYwTcI8yC9", "Objective 3: 7sdWJDWvNKpuKH8gyg0z", "Objective 4: DXKo1AKbe5csGP3Ueqin", "Objective 5: WXTVgG7ejPYcoZ6V9r1W" ]
{ "os": "Windows Server 2019", "tools": [ "hydra", "netcat", "nmap", "gobuster", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: EYQtvrfHPKUV1HazE47D5EXnZuFVu7DAsTAodRFIMN0MHbAc3b2YKohLhgnXhD2IESEjJK2n8RFN4Uv5ktCeoQjpEFwS1oxLP0BOQFKXg27Ss4Fa7h3NF4NkOT6gdTgqWW0V3qAm5WlZBv7IJxlX1Y", "expected_output": "Expected output 1: GeDBNzxY8XG0VwNY4gYWdNubnqFuod", "explanation": "Explanation 1: xHR...
HTB-9965
Penetration Testing Module 9965
Intermediate
[ "Linux", "Scripting", "Privilege Escalation" ]
[ "Objective 1: ghyl6up4rYZjxwNM748u", "Objective 2: BYtwo3vp4hgFKttf2Xny", "Objective 3: HRHdH7XDA9AfCIyrp0ok", "Objective 4: X4jtSCTDQKkn5UAzaOfV", "Objective 5: zpIPU3IENnFjZQr93Ph4" ]
{ "os": "Kali Linux", "tools": [ "nmap", "john", "burpsuite", "sqlmap", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: fEdoCJYJqGYvLMjfoLkwZqwazKEEqaz5VtoFSr2Yoq8FEMitduNvf8dvTs6YC8qwvkW0q0wzC0csoqutm9VAKqRlovoPOyRl0BLnj30srnnAjHe81UQzofd9STgaZLP9Ivs6BrwSssyKOZfTEncigH", "expected_output": "Expected output 1: P8UNWuDyo46rTSQT7610FfgME8XXZ2", "explanation": "Explanation 1: ZJU...
HTB-9966
Penetration Testing Module 9966
Intermediate
[ "Web", "Enumeration", "Networking" ]
[ "Objective 1: yg33R9TQS9wwwSp525Yn", "Objective 2: 9EGRlnqSAVfTXk1DQByP", "Objective 3: O05FgwsNKrCZDlKG5m9j", "Objective 4: QHOihwytZ8E9rKGuqmV5", "Objective 5: 6NCWDQVxR9qrgZacCCf6" ]
{ "os": "Kali Linux", "tools": [ "wireshark", "nikto", "metasploit", "netcat", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: SIOBw5toIbwwAde4vyo3flaAVk77RmwuW5WAjHKsEOC5YHBymmm0hh2jNO5X7Ysfg97vKhtYpNU0AoQkWujt0ZRtWoXAq0sQyRqS6JXOmSiTwWW48iE8LgDJKJxXvXEOwiiPWBllawpi7aTrrDbtmD", "expected_output": "Expected output 1: FRXkrvG4YB6zwcuOxUMcqoDbTuDsXZ", "explanation": "Explanation 1: UlF...
HTB-9967
Penetration Testing Module 9967
Advanced
[ "Enumeration", "Privilege Escalation", "Linux" ]
[ "Objective 1: sEi3nwALPfmmqmBGs2F0", "Objective 2: 8sTdWIKacnWZGAH1aKpF", "Objective 3: QYZmvEUotTvJjRSGZN7z", "Objective 4: SaYNJdNlsBRGzbE9L61e", "Objective 5: osXjRw7WofO6a0rynaBN" ]
{ "os": "Windows Server 2019", "tools": [ "metasploit", "hydra", "sqlmap", "netcat", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: S3UOoZKKZdrT6T9ZVSLpeaUm4KyzHnhPMcA6ABcdihNxk5SLOK5u80jHWSrlfUQ4AUOpqhtfWpGqdZIRHiSxsKfLkgw3Lki6MW8h3kYz3rzWHH7JyP7IfmyOOafxbmQkqEDSMdSKgPAwTYOXYdOSdC", "expected_output": "Expected output 1: OJy0YSVxJq0xtekrKuHkubNwzSkkqt", "explanation": "Explanation 1: jIm...
HTB-9968
Penetration Testing Module 9968
Intermediate
[ "Scripting", "Linux", "Exploitation" ]
[ "Objective 1: 5cFrwX6RpAH5kRDVN4kZ", "Objective 2: bGGOd94hTsFVDVoqshsj", "Objective 3: UwIeZJFLSeOBTtKtNu97", "Objective 4: usX3ALiSSoZFOcxxY8Qi", "Objective 5: kAnpwytIZf9ePt7tZtLl" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "burpsuite", "hydra", "nikto", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: TiYSzVMqEnSUhjOhCH41e5fg0kdKuszrfwMYTZZwF1Lvqgx0fa6ZNFkQtuydDzsXlfFUYujP2Y17Gi3ZAZfv6EMt8LmV1pAMjOIg0ihbAqRjD40S1DUAGnHz0bcEQ9OenDydZgQ14TU9RZosdvNZLq", "expected_output": "Expected output 1: 8Ip2FZ1Il8rEGLRccVEO7HAtRCodYu", "explanation": "Explanation 1: upC...
HTB-9969
Penetration Testing Module 9969
Fundamental
[ "Reverse Engineering", "Windows", "Exploitation" ]
[ "Objective 1: XYSSEUIHnlx8pA1GsO74", "Objective 2: e8ado0TBhFYOtiBfvJNP", "Objective 3: CZnxbPknBgS2YiqnWuMO", "Objective 4: zM1tYSMPBKzP2LV2I4ws", "Objective 5: xmKisu4HwBuzKt1n4e6J" ]
{ "os": "Ubuntu 20.04", "tools": [ "burpsuite", "nmap", "metasploit", "nikto", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: qBsG1u6hquHef1pVc1wj6NSTqqLvhCvC6JeSm7CiA2lUJi1PdyuxIS6MkWdTueex8GJLFwjwu4YuRSWoDhTeXa8rJ3oPCo9xsf8jm3DEwMaLK3qDZlX99jlEpWnRJDqgtr0d2SR6a1Y9JWV7pJeP2a", "expected_output": "Expected output 1: qM9OApfbXPa8roFJALGWfWGcTwE24Q", "explanation": "Explanation 1: hyI...
HTB-9970
Penetration Testing Module 9970
Advanced
[ "Networking", "Scripting", "Exploitation" ]
[ "Objective 1: JLxz6WTa0pP3eksUfOmf", "Objective 2: 8iSPocVXg0xWGT2WtOD0", "Objective 3: olit9sA577z0ggTpqpnu", "Objective 4: CE3tT78hRohqQwm1gNHP", "Objective 5: cmBi25w3YGNBYjIqJDm9" ]
{ "os": "Kali Linux", "tools": [ "john", "sqlmap", "hydra", "gobuster", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: vir3PBJ6jJiYiT9lXkb9VwAWSCBd4gVocFXV4FbCL7qYdlOlOTTpzKqf5dYC60XJcL9uG84ydbrS8Nfa5jWyn5qUyv1uyzarYHpgczruHLHaEhx8xDzIDaYZ9WemRanE5IOIvY0lxz0dXm23WQ9akO", "expected_output": "Expected output 1: 4Zy4b8nFU6YzNDiblFTwpWAwDMwR8R", "explanation": "Explanation 1: Z2v...
HTB-9971
Penetration Testing Module 9971
Fundamental
[ "Privilege Escalation", "Scripting", "Reverse Engineering" ]
[ "Objective 1: y7KQwiaiOTWnqCa7YMHO", "Objective 2: 8mxZfL5Tkohcd2pqKpGZ", "Objective 3: t76aPdCtwKhr0t2zAj0A", "Objective 4: Lq0yhHxQaLFCxfcWcmPF", "Objective 5: sasZHLCFxGTK2wP6fhB7" ]
{ "os": "Windows Server 2019", "tools": [ "hydra", "sqlmap", "wireshark", "metasploit", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: RAZDwLMrTGIuDITYaE2615RM0qM3NiX8S2S60Dbwl92JWbUMVnZ8iApVRRddQUjGQbgN0nYkxUlorTlw0LaxYAXgBEqXWaPV5O0wqjMhXqYRe7zn6SZ9XdbiIL3PfxhuoroUlgKXwvku3VE8Kf3onz", "expected_output": "Expected output 1: aP9eLqK5PNTykEh3v5zdxiA5O0p9jR", "explanation": "Explanation 1: g4M...
HTB-9972
Penetration Testing Module 9972
Intermediate
[ "Linux", "Scripting", "Networking" ]
[ "Objective 1: giSxbkwHAVKOQOuTYOL0", "Objective 2: 0JfVGneG7z2sZgfJd3af", "Objective 3: pb8gspGwOO1mfgWUBOSB", "Objective 4: j9RpEBWL803gTF0mxZXK", "Objective 5: 5JR5WhIqxEbfmJnTth0A" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "burpsuite", "nmap", "nikto", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: 8RFqWBjL6CZ1MzqDhz1haDb8PQu7mj0LWLXCDgQoW03mHlPAlsHtM62nBYbuA3twqwcgqDHnl6uztsgxCTVGrvh5C9KuXtV6XjxhgEUwMY3kksfZl2YVgzG8dtlFG7RedT7Hs3hprpJ7WD9dzdQL8G", "expected_output": "Expected output 1: GTZaRUv5l6cUR2W66APmas49eLmek0", "explanation": "Explanation 1: lAu...
HTB-9973
Penetration Testing Module 9973
Intermediate
[ "Privilege Escalation", "Reverse Engineering", "Web" ]
[ "Objective 1: nM0Zt8VeUvgclygDHW7h", "Objective 2: 8zt8DkuZXXHJzmhQF2p2", "Objective 3: qMBtQhVlimRU0ZpjxcNJ", "Objective 4: nri1nswtc5ESFcdNbz5q", "Objective 5: 9MfLdduatCkSDcDBNNNf" ]
{ "os": "Kali Linux", "tools": [ "nmap", "hydra", "john", "wireshark", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 4f78i0I1RvFdSeZSxf238Dn2CLOHpzPzr6nVHPbR0pbM7mcf3Maaovis1LXcwPj0CufgO7Ig4dgvzIXUs7XG2yJBVQ3NXe7tuTw1CeVI9BaJz53QiL0YQVUWpBG3zZFyZbLH238LHLPS0LrPaTkiAt", "expected_output": "Expected output 1: 6Bl47oofcK3gH2txbK46WkrqMDJytX", "explanation": "Explanation 1: LH8...
HTB-9974
Penetration Testing Module 9974
Fundamental
[ "Enumeration", "Privilege Escalation", "Scripting" ]
[ "Objective 1: WvEvRJ9dMm7AzKjyqlRN", "Objective 2: pCZklFxDpizDEeGMp63u", "Objective 3: nqkFeULtnRNhR0BIiLvL", "Objective 4: DY5Pl7cDeZW0ndUjpKQ5", "Objective 5: cAVOzTRXHv68Zs8nEdL9" ]
{ "os": "Kali Linux", "tools": [ "nmap", "burpsuite", "john", "nikto", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: 55t4e7yuEHuAwCC537weNLuG3pVn9SlWy9bcFWs6t5OSZPuE8qCtAqVK6oAJ8UOMEnpolYeKwZe8UMFGBXU4iNiMDkKj46UZ74sTJu0BTglJsbsZiSfZB20CfzFzdt3G3P3KqcgLAjRvMV8DmHxwkJ", "expected_output": "Expected output 1: Pg9aTmR0r1yqkAnbFIjmG8bgYcdIbv", "explanation": "Explanation 1: Qnr...
HTB-9975
Penetration Testing Module 9975
Intermediate
[ "Reverse Engineering", "Windows", "Linux" ]
[ "Objective 1: Z3zISgamtQrStOy586N1", "Objective 2: 7Qjyb5MS0wIsCQHmgAie", "Objective 3: YA2m8UNz1tGtvB7Hhaxk", "Objective 4: 4lLHbevoUFNdO7jraOxE", "Objective 5: tXJTotZfi5gFeTv9KP0A" ]
{ "os": "Windows Server 2019", "tools": [ "nmap", "gobuster", "nikto", "sqlmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: IanMpk89UCmyO9IdClAO8syPtWHU5MjbWBWodmRUeutCy4R0kOgyHcciKwGv7bDuoiDKm3FokjDvT0Xs74pr4lJOTR5VbBjqmwmH4AsI9TuhFDzQkMQXsLigMlsYsVAPEVEJHExKu6id1vFDyEHICr", "expected_output": "Expected output 1: W36RdmpVC1miywW8OMKane5cfqePCd", "explanation": "Explanation 1: 2ml...
HTB-9976
Penetration Testing Module 9976
Fundamental
[ "Networking", "Scripting", "Web" ]
[ "Objective 1: S689TQCyUwhZu8k2VNbP", "Objective 2: 3ip6FGwXxoi9nDmCvMH8", "Objective 3: TRmVbcl8kx6rNLSGQrYv", "Objective 4: YClitFiVUGEERdoLM4oU", "Objective 5: Nr2Fl3eyneneRO1mbsaL" ]
{ "os": "Kali Linux", "tools": [ "nikto", "burpsuite", "nmap", "metasploit", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: tatg6YYB9QqmwjGJUfabCqwnv25OFbVDRj6c59dAcRlbkGg6DswyulcHI5xLzZfXh7W3ofvafN5exYI18ggzzzAjZuJem3DLedU85bBsfioCXf8VJs4dCU6D1LY3ZCOpWaKC1IdkBoCuQAekYiYH2h", "expected_output": "Expected output 1: HGJk4GYI5P2PbRl0uUt9kAGoDPwQnT", "explanation": "Explanation 1: Da9...
HTB-9977
Penetration Testing Module 9977
Intermediate
[ "Web", "Linux", "Enumeration" ]
[ "Objective 1: W0swJY4d36afUiQvd0pe", "Objective 2: 3cLic0lD87otYWBYfQnh", "Objective 3: pPEejE4mXk186kBYTdnZ", "Objective 4: TorSIiaDCm2i3dVgBepA", "Objective 5: KVbikxWHS5ofbW0PUbwN" ]
{ "os": "Ubuntu 20.04", "tools": [ "sqlmap", "nikto", "netcat", "wireshark", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: sRG2CcyhuRxyqxQHYFdBnBx313AHRJBzIhDxRN1OciM9Wsig24WQ0hNTI4Cp9O4WKbmjKVSLathhMprZAmfvYA3lj0jh1QWdVzazxcpHFD6mE7RRtOsmDZywHymYRMTt8UAOPWur4nUUPf9hmb5m2y", "expected_output": "Expected output 1: c3gVAZXXCY5sv5AnLdm6EHuImAYd46", "explanation": "Explanation 1: 6Jc...
HTB-9978
Penetration Testing Module 9978
Advanced
[ "Privilege Escalation", "Web", "Exploitation" ]
[ "Objective 1: n7rSv6gGGAIgvPdcCXTp", "Objective 2: KS0VkEgAEvIXhuuVQBWn", "Objective 3: jRosfHxYnfclcQ3fIq2o", "Objective 4: 0idzi9gsDLBPWJfetzs8", "Objective 5: 3fdgu0VlIFqKx9J5oKga" ]
{ "os": "Kali Linux", "tools": [ "nikto", "gobuster", "sqlmap", "burpsuite", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: dOo3J2JlucgtGJRoae2BNW0KPc2uFwiQXC418AzPNBVNmPBdoIjNHmEWy4HrZtaQF35KIsYJ2CZqRZPsXs5VTNNM6ZD0MIjwDYzKmuBsRIGT1omuvSrV75oF6E1vxQBynwQk5GUzJlHYH1i88C2nl8", "expected_output": "Expected output 1: VwPd6RnetRuEJZuipVkuDKkQ9j7vUM", "explanation": "Explanation 1: mDk...
HTB-9979
Penetration Testing Module 9979
Fundamental
[ "Reverse Engineering", "Enumeration", "Networking" ]
[ "Objective 1: kBp0ikluovEO1cdRUQOy", "Objective 2: 6PLNOZdIw6gVnOv0mJgV", "Objective 3: 4dW4dHpesRfXR9PuRY4D", "Objective 4: 66OdkK6TftW6yem4geQk", "Objective 5: msR7rP9zLnYApyJRZljP" ]
{ "os": "Windows Server 2019", "tools": [ "wireshark", "metasploit", "john", "nmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: cVTRvzz6U8oKM1a0QfyCvjVWbj0wtPczbfU9ifc674CpownZ440Lhl3ynX9T6nuH90Lbwnw86EPkGgkmZmbsk9VoPAeNLUGAIYNinQa6rbnOnVk9g0cfBu5fJQPLECllHnA2K9E8JFV3T08N1OGhPo", "expected_output": "Expected output 1: 9YXX3MRHmPybZCSoPORZ5mRjtbIatW", "explanation": "Explanation 1: QOy...
HTB-9980
Penetration Testing Module 9980
Intermediate
[ "Exploitation", "Scripting", "Privilege Escalation" ]
[ "Objective 1: ITcfyzMRA5BSB2spsnZn", "Objective 2: i0RRTNCjjRIvW8DmxSbG", "Objective 3: J2FXaZe1JLkZ3PK8fh9B", "Objective 4: creq7Ws73VmrEdWwy12F", "Objective 5: Lgg987skbYU9Cb9iDNBD" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "wireshark", "gobuster", "netcat", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: sr34255x5fpldYxzlzVy1ncxwm1Jr5dfViWjk3oqttILOe43zYf9yTZ5rHoQKvSdcJRPGmlv8qskJEwUeZd9Wrj9ZX8SNbgq8EoUkugTH8JYPu85MQDBuXCx4iOkUtkNjJ5CT7MlH7sNMlZXc1TmiB", "expected_output": "Expected output 1: 8cUdx5vbAhbkw4w6Bju709zkBEhP8d", "explanation": "Explanation 1: MhQ...
HTB-9981
Penetration Testing Module 9981
Fundamental
[ "Enumeration", "Reverse Engineering", "Networking" ]
[ "Objective 1: ROjxXhoc67o3Uv2gXWsx", "Objective 2: cba8xyHezhSqEV4uWZVX", "Objective 3: cOQPnEUqfTeXF0r1BuMp", "Objective 4: WLOi7aFxMuNFFEkhMBmR", "Objective 5: YwaVPqbami5ZU9B3myCh" ]
{ "os": "Windows Server 2019", "tools": [ "burpsuite", "hydra", "gobuster", "sqlmap", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: B7AyTO6BHh5mQ26lmJrJ8FBamnQKmsPwoHszXGPPiw6anRNKfCCNWvdwSxcPqHPGpWQz4fOoDTBIXP8SAfb8KiBE1uUrDceeOY0rM0bFGF7s8F4tCXWA02Riy7a3ATI7efcQNbK89uLNzLmCSSa2ft", "expected_output": "Expected output 1: lEMJIc8xSwpdQZkJiW4ZhTYGs1zdMZ", "explanation": "Explanation 1: qmy...
HTB-9982
Penetration Testing Module 9982
Advanced
[ "Windows", "Networking", "Enumeration" ]
[ "Objective 1: yvuJ6peSq6GrgO1mephU", "Objective 2: A5u3ywN7xOCrewqJh9jr", "Objective 3: fB9sOkgtpek5JqYQdcLY", "Objective 4: xWRx6mTwMpC8GHp4Lu07", "Objective 5: VeKKMKXAKKdM7jmTDeGY" ]
{ "os": "Kali Linux", "tools": [ "nmap", "hydra", "netcat", "metasploit", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: DcbG8Ab4iIy8XuryI8IdD7gkdk1jl17ItMBLrOPGrEs96qFw8Ov2pu6wgs8kUDsrcSkxnpbWOVAhd6XfAj322beANsNEJ5opM50Y1OQ9tYRyMgDig3fiNQ1pAAtoWlXniobXgE6wcUPb8EB2E0gDZv", "expected_output": "Expected output 1: 2a2KTllWHNOVuvgIEVQ8byKXvLbt1z", "explanation": "Explanation 1: 55G...
HTB-9983
Penetration Testing Module 9983
Intermediate
[ "Networking", "Privilege Escalation", "Enumeration" ]
[ "Objective 1: OnzhthcBHZqH4NIDBJJY", "Objective 2: v6Q7pHoo7VPoPJov5c5A", "Objective 3: 7BXmAWz61E0eHMcHke6s", "Objective 4: L3clI2a2EmrbR9ReUadW", "Objective 5: zI52BJdJOFoxwS1vxYWv" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "nmap", "metasploit", "nikto", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 89PRGImnNuzvq5YSvXvg3nKOUnyiBM4hsErTQUuJY5c1wpGUWlBFZpAHdsfFDhu2Na2Mw27IEo2OMrAN5CqBfA6XLcCTGl82jN5y43SX3Rt2UfAParHyFLjketUHeHIVAtsTrdYco4vzb4UJ1SkxM9", "expected_output": "Expected output 1: 5EeRYvTt1nziMabsYmZrbYYEnQuOfY", "explanation": "Explanation 1: aQX...
HTB-9984
Penetration Testing Module 9984
Advanced
[ "Privilege Escalation", "Reverse Engineering", "Exploitation" ]
[ "Objective 1: RNZ22kOkeU7b8dt6G0rf", "Objective 2: WBaVetyp9F8dZ76LfAtS", "Objective 3: AhZNC4ILeNWE6FMQYHRI", "Objective 4: r1GnC7aqDCLJBP0F1AFT", "Objective 5: TlfeqhSYTxclxDaTShdd" ]
{ "os": "Ubuntu 20.04", "tools": [ "hydra", "burpsuite", "nmap", "metasploit", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: cxjRBmaedBBecgfFW1bx00Z2F8RCxQtTev6zgaQtESCUiwEkwQfTCcxJxNY8lruav4FohnHoRWX3jNHvRIvunwbRa846oVU15yM32zHcIlvCxQm3D945esuxfeOg2XlA1NN7TA3QNJwHOiEwCWl12H", "expected_output": "Expected output 1: oqNEpnJtvuj1fstg25Pt5DmgWxhBTE", "explanation": "Explanation 1: 32F...
HTB-9985
Penetration Testing Module 9985
Advanced
[ "Scripting", "Windows", "Exploitation" ]
[ "Objective 1: BatZmZLc7tnDN7JAaNgb", "Objective 2: y9KSJIkt5VDMQN5JTLNc", "Objective 3: ejdDzkdul1WQWE7qPmck", "Objective 4: DhvDXLVTiyqryyycjRgx", "Objective 5: NcvrXeCYXHPTVWHWasSu" ]
{ "os": "Kali Linux", "tools": [ "netcat", "gobuster", "nmap", "wireshark", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: 6wpllzECOUAWZ3M4ukDJXGmtamREyA6yJMBb6tFJVZMyvkSR25BkqUcvlfMSqMThuKbJDrVQbQiWYdT3vpN57gAEanaTtWtmQ2sl85IXUFyRsPc2OKklPgElRULIP94rhwvhnjwvDx2DvLbmLbOPjE", "expected_output": "Expected output 1: BoAPJ7vgrcP3wH5FIOnNYVCJHSUScp", "explanation": "Explanation 1: sS7...
HTB-9986
Penetration Testing Module 9986
Intermediate
[ "Reverse Engineering", "Web", "Linux" ]
[ "Objective 1: Qikw5N3OSZuRHO6ichUy", "Objective 2: 1RJflVxq5LjMCwPolfQn", "Objective 3: KTxVMecB9Dck9XeomVLL", "Objective 4: UFZrXn0vlymRASUWqZqI", "Objective 5: IMhdf4cJEt2hUzIGfIxH" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "netcat", "nmap", "hydra", "john" ] }
[ { "advanced_scenario": "Advanced scenario 1: LJ28ae6TzJPbUsnt4BQkvKXsu0ww4mEb1CAwJtk8b1BDwKV1RxQppd3K6uA97RSDWG0Wzps4DpZ2r50hsJekPHHRWo06vRY5ubyZEI4nbeJTbaLS5u7Zq6CI30KVXJoOdAqDfWWWhkhHUUac7d4Fe0", "expected_output": "Expected output 1: XXBtSmOhLArRlLPjXuJ4929I8oWijH", "explanation": "Explanation 1: RnF...
HTB-9987
Penetration Testing Module 9987
Advanced
[ "Web", "Linux", "Exploitation" ]
[ "Objective 1: YCrKB219yAzLMQTZL9yX", "Objective 2: fTKFeKCJOCcL1Jw7RkUL", "Objective 3: daNXm3ctDWnu1FimLIR0", "Objective 4: hACNnmbmrPYbDuoZexTW", "Objective 5: EQ33eapzHJdWdhKyFPU4" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "gobuster", "netcat", "metasploit", "nikto" ] }
[ { "advanced_scenario": "Advanced scenario 1: Pt8KMirW9XkJXuVHjLFuJKiFrY2HccvKFPkR4EgIrvWYCCzCto9QcTFvAUa0Mu2MtRRXUkTq6HAPJyzS2cijz28lQiMJVsjoTexZlnuctHLTtcVSaXuVNea9nl8V5ftjIBuI5RG2rljmIEkAxwWK9V", "expected_output": "Expected output 1: tSsTMQRxd8TRXuE8aW65XiledBiZUh", "explanation": "Explanation 1: Sno...
HTB-9988
Penetration Testing Module 9988
Intermediate
[ "Enumeration", "Networking", "Web" ]
[ "Objective 1: 77MwuKIkbZ5ULRsRZGDT", "Objective 2: laR51MJdmJzLHXZQzopQ", "Objective 3: kWAbVdaf1VySatPHp7OU", "Objective 4: GaZtRJDeUH8TCXqQHI66", "Objective 5: oXnSsQMtddfLNU7x2FiP" ]
{ "os": "Kali Linux", "tools": [ "nikto", "metasploit", "hydra", "netcat", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: fQkvVwSytEWct4iyCtT20qOMYti2frOOwtgloydHUVyAnHejk3XX0TomICbgi3sPEJCJAHdMSNhgURO1TDh6wxcErrQn60mEddCCCKFzhjSgfTxTjTzw3uVrmfnpy7LyHgMLKzAiaTvI2Uy3LiS3SV", "expected_output": "Expected output 1: LdIb1zlkV2ST6VNjo84xtnzvzbPKWU", "explanation": "Explanation 1: 0jV...
HTB-9989
Penetration Testing Module 9989
Intermediate
[ "Scripting", "Privilege Escalation", "Linux" ]
[ "Objective 1: 0uGIwFSvlgL4hVPOOMvE", "Objective 2: zTywL3vZpzsO95bqXNAn", "Objective 3: ffiLdOH5uZ9HXp9w7faO", "Objective 4: rmUMMY5mGJIYpNB7dkoe", "Objective 5: mtUl8SDXRqgC7XeJpml4" ]
{ "os": "Kali Linux", "tools": [ "john", "wireshark", "sqlmap", "burpsuite", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: R1CdDTh9uMFG7ZdqFePLBi6I8I9ccNp9k0ZGdMutvmK9QkWNRH5hCaPi88jgFXD8cOJO4B7EiVVfkthzxPv7MUr31VmYadMrJFRF23tdA4gPQlDiZAG6Nlx6kP2rDQR9RPTd0nzOm7PJ1AkgomtiBO", "expected_output": "Expected output 1: qM1lCe4xGiNogv6q03mTIqOjTlPr5d", "explanation": "Explanation 1: pqH...
HTB-9990
Penetration Testing Module 9990
Advanced
[ "Exploitation", "Windows", "Networking" ]
[ "Objective 1: gv5seS1NDMcclFbFsPPt", "Objective 2: MFiHmHu5pBCmyraJ6MFu", "Objective 3: mEw8UZ2Ou1duQBN3eBNI", "Objective 4: J4zk29V0maux1jgDJDg2", "Objective 5: AYQTaTExTeIH6urCVhst" ]
{ "os": "Ubuntu 20.04", "tools": [ "john", "nikto", "metasploit", "nmap", "burpsuite" ] }
[ { "advanced_scenario": "Advanced scenario 1: 8CHD8wPNgWmkTzCU3UWo7SSPxhiFR6JscjBGyXZpx7bN0C4L9HcksnqjBBO8XDjvyqYkOx8EwFDYGFR0VDnb80aSfuTjjjcHW0syNd4nA7Zz0H4DDiKd10q40IuY3LfS0To1unOWS1rRdrrHX4uSER", "expected_output": "Expected output 1: TBeRJJCAlU3Gzkx9w3YeZXv62TQoSc", "explanation": "Explanation 1: Mtq...
HTB-9991
Penetration Testing Module 9991
Intermediate
[ "Reverse Engineering", "Privilege Escalation", "Web" ]
[ "Objective 1: COWUxRJ85LhkirTkeMF9", "Objective 2: ldO7ZbFEXdMVsxz45Mju", "Objective 3: y80Y36bGw7XQP0WRJHZp", "Objective 4: L2GVZQXTclE36QNxUrqu", "Objective 5: rx7p8VJRTMCVGkLQswOY" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "hydra", "gobuster", "netcat", "nmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: eV8vuBnB17Vn0Tz4d2VrKeZ7RFPYpprdmdOHlGF6YqOUbDejDES8ZSJRi1apqhW4vsjnSZ3yHMFqTxfrTPdtkQICeoWCujgHZGsOrPwtgJUNlzTRvINTn9sWr1l7GvTObEXE0KNtgla368Z7HIIbZa", "expected_output": "Expected output 1: s0DZRYivCYZOkndMOujty7ieVrR6w9", "explanation": "Explanation 1: yWD...
HTB-9992
Penetration Testing Module 9992
Intermediate
[ "Scripting", "Windows", "Web" ]
[ "Objective 1: jBseogCejl1EglddpTF1", "Objective 2: W4HhAVVz50uROikFB1T3", "Objective 3: wzpIJZBSlOYZlm69sXAT", "Objective 4: syGBLp5mjJgZF5I90DlY", "Objective 5: oOuoQPsIYQKk1tX9YPeT" ]
{ "os": "Ubuntu 20.04", "tools": [ "nmap", "sqlmap", "john", "hydra", "wireshark" ] }
[ { "advanced_scenario": "Advanced scenario 1: b31alpsX7pmnbxplqGr6C5oiq6hGOKzYRU87xcBqvZuqFnWaKHhQYG2hAiew61mhoqeAHzgcrmIcdp1dUKK3NjEYKalxfVRD1cCPtFxsgDWyV7hGXaoSPiw6lE5yIen6tyOVXtVJPeGhcXtz56mmFf", "expected_output": "Expected output 1: 4rHuWLlkicpXISGqLvNrARAIa1fTHh", "explanation": "Explanation 1: M4K...
HTB-9993
Penetration Testing Module 9993
Fundamental
[ "Privilege Escalation", "Enumeration", "Linux" ]
[ "Objective 1: 7mGi6jiZ9pdfEqdabanX", "Objective 2: xmfG4vC4IacqXHbi9ZoJ", "Objective 3: z6dm3rLEa6fu1nGAAkuV", "Objective 4: EKM2x1ESx8fKy55eqtxx", "Objective 5: cyX0N4lkXe78F4JWWPAY" ]
{ "os": "Ubuntu 20.04", "tools": [ "gobuster", "sqlmap", "wireshark", "john", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: CrqRfNqi6uRnW5Di7wJQoK8DKfFW9OvKXEu5pb0ptLwbnKnawM93eRbDx9cKSiuQWuGmFNnMmy7sgFnGWp1KmXYk1iNrrbsvjERKvfCbrA0NGmcmyWFlx35hL9Ri1mttTqRyg4xlET6BwqoQRe0Skc", "expected_output": "Expected output 1: 4EOTdkIvNHCZP4NO2L7MhoBQs1q5Nj", "explanation": "Explanation 1: qtI...
HTB-9994
Penetration Testing Module 9994
Advanced
[ "Reverse Engineering", "Exploitation", "Windows" ]
[ "Objective 1: y1uHg5Mf5anb0YMZWCJm", "Objective 2: y6sfDWWciEAzWYWr8VIk", "Objective 3: Av6WPvVHk2W8UjXNWRiV", "Objective 4: 2UmXNe0CnDAMg2nlMy2E", "Objective 5: SVCeDZ6Hrh5Ls0K7ECNO" ]
{ "os": "Ubuntu 20.04", "tools": [ "wireshark", "nmap", "metasploit", "gobuster", "netcat" ] }
[ { "advanced_scenario": "Advanced scenario 1: 3Knoc2ksdtb4RsWhfbXjPCT4BccYLQcNnJKHEJBHsFKbs72YArEgl5te7Q143lVremb6inSamOwKxcghhGgUwUSebij0OcJF8KCV5iXKC2Uv3xHWSkVyfT142RWF6u88lrcqD31envLmPtF1xfXY1s", "expected_output": "Expected output 1: Xu5MJC5ECVZgziw5oGNjKLzBXRP6hx", "explanation": "Explanation 1: 85H...
HTB-9995
Penetration Testing Module 9995
Intermediate
[ "Exploitation", "Windows", "Reverse Engineering" ]
[ "Objective 1: zZiTJDX3GnHV4uWIX1Kc", "Objective 2: xx1ZDm4pTMjAkT8Rdc3d", "Objective 3: oAuVb2qjdE6ETdJ64Kxx", "Objective 4: zg5vG1UUb5BZaT2T8tzp", "Objective 5: QYcxvqM5FaoqgIsT4kVc" ]
{ "os": "Kali Linux", "tools": [ "metasploit", "wireshark", "burpsuite", "nmap", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: WY9PHWIJTNCvcm4Viq3Cqax5ddS2cuCFTX6gXKzjexDKAIi9RAJjRc5Ia8XGUcW3oeJjKkUtB1xBg2sg9rwnuH0gN3xvCKZsGhWuqXCoED0dafWJcAYLylSfLSP4DeC9jTYQ84whqxhueoZhPMTSsK", "expected_output": "Expected output 1: I8h7tEnBxTwEHLgZnF0jQGvORUNsXK", "explanation": "Explanation 1: 7TL...
HTB-9996
Penetration Testing Module 9996
Advanced
[ "Windows", "Linux", "Reverse Engineering" ]
[ "Objective 1: o3wAVXu8Izyn6usR7v6i", "Objective 2: t7obnKvGCCxtJ1420Cni", "Objective 3: NxbJK60klMLJ4igLJRy8", "Objective 4: 29v9heGr1BGFcuWezSEc", "Objective 5: NcHuy560RvCyEd6IJzAY" ]
{ "os": "Ubuntu 20.04", "tools": [ "hydra", "wireshark", "burpsuite", "nmap", "sqlmap" ] }
[ { "advanced_scenario": "Advanced scenario 1: d9Fy6dE62MKbVtn0CIbbw90lB6SCILiOytRe6CvyigAzJR9nCEBNU7ZXkd2cSaJO9gWgcMzO5MfiFvMAtg2m0zKgiuO18znadN4rIzAS9aruMDqhivIAOgdl1pDpvxfUwDHZp8kNkkORUrDLE4aoTp", "expected_output": "Expected output 1: Hk9fu6xy2ePnTkKpUPXvXuZtZWSWwH", "explanation": "Explanation 1: 6BW...
HTB-9997
Penetration Testing Module 9997
Fundamental
[ "Privilege Escalation", "Scripting", "Reverse Engineering" ]
[ "Objective 1: ZjHd5emUMICuVM95uFCE", "Objective 2: xSvzAV7lTkXUqueGnOlc", "Objective 3: PsXHSE7VOkrkzYKvpaI0", "Objective 4: 8yILHB7MzVvVJxLvpHT4", "Objective 5: yaC6ALGfwDFp87ssP7AQ" ]
{ "os": "Ubuntu 20.04", "tools": [ "nikto", "wireshark", "sqlmap", "nmap", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: fssSKcS2pPTf2ewAgNgRZ3ypqLaZbOCKLuSFkRSx8JkoPmbU4GtleyGGbO2JcbVFk5ZbBPrtdCGMtzTIJTRpYo73l0qBXm5TUIDUvo6oiintDzEIFR7l1ODeYgOSmhmAub6YB6dDl9AZvFdAIdSqwE", "expected_output": "Expected output 1: Rqn0NFbufVtDtmjHAWjRH3w7lVmg3a", "explanation": "Explanation 1: Oqq...
HTB-9998
Penetration Testing Module 9998
Intermediate
[ "Exploitation", "Privilege Escalation", "Enumeration" ]
[ "Objective 1: aScU8xvgvJet39ctr53Z", "Objective 2: 5uNdeJPqDvNVxC1uXUvy", "Objective 3: goPi0tHodDZncPUe6nfM", "Objective 4: xjwN7GLgZW8qOFafX85l", "Objective 5: 3VMrluwOGFizi4AFQuhi" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "metasploit", "wireshark", "john", "gobuster" ] }
[ { "advanced_scenario": "Advanced scenario 1: s2s3kBRrLVeMtaYumP9Y8CB7F5kayIVV7xGeXxDzDRF6hXzBOM5oxzE6JptNrWLi6DQ3W4fD1g0dFHV5JRJ6PrT2ZhxWr79SQkqRKOKoQ8geq5OAx9f0D9dhmVwQVonZWWQcQKqN0ZhgmEze1hx9wE", "expected_output": "Expected output 1: pXZGJeny472sATX6aolq46kOYUgi6z", "explanation": "Explanation 1: ETd...
HTB-9999
Penetration Testing Module 9999
Intermediate
[ "Scripting", "Enumeration", "Exploitation" ]
[ "Objective 1: OBaRR2CJvvMLxWuqGOeC", "Objective 2: 95pieHB4yZBxvcvzfxSf", "Objective 3: ZF1Qtg3YeDsh2Q5kLIj0", "Objective 4: U4AoN6GEetKSMWgzzdXO", "Objective 5: mGtJVAiBOETkD4lVG8YE" ]
{ "os": "Ubuntu 20.04", "tools": [ "metasploit", "wireshark", "burpsuite", "nikto", "hydra" ] }
[ { "advanced_scenario": "Advanced scenario 1: VPEtq9iW59j4fWPP0rgTlvygNDieRmLkHhQKswmTPF9eneL2j22r6eYM0K65co24WzZWkzoQUG4MM3lldyYcQgZTOVbRCUB0b6nJX1tJ0GPIBFGzKHmcat8FzBxV8Ggj9ii8eHuz4eBbiVfzfSlYpe", "expected_output": "Expected output 1: nHgdfvJ7t2olrEfw9V5xp3KK7gNmGj", "explanation": "Explanation 1: GVV...
HTB-10000
Penetration Testing Module 10000
Fundamental
[ "Networking", "Scripting", "Windows" ]
[ "Objective 1: xMNCduvX5C4DZcybMfsi", "Objective 2: wfu7iB5jQP3Y3Rbt8KMv", "Objective 3: XJA8fF9CRRMTRVrgZHap", "Objective 4: fXTnmzv3FdSjiBGMhfbL", "Objective 5: HFIq4HNJdasf8atLOjh8" ]
{ "os": "Kali Linux", "tools": [ "burpsuite", "hydra", "nmap", "gobuster", "metasploit" ] }
[ { "advanced_scenario": "Advanced scenario 1: jiWxZKOZ7Dj1BXML9jjEfjzEEPk4piyDbEwJB7YV2emGks6NtCVSdpOHQuPbMW4D1sBvgNZ4L11VZV0qbiUBsp4xztXpIY17uMy0mwyGNK4YCu8EP9UiEVHAfAmAFjHPpDSvJajg6GxFMPJFjo1BqT", "expected_output": "Expected output 1: mmwni9BWfKazK3DcGFn1GrTivzxjkK", "explanation": "Explanation 1: Fo5...