Step into the shoes of a penetration tester and tackle this realistic SSH-based challenge. This server might look secure from the outside, but weak credentials and dangerous sudo configurations could be your ticket to complete system compromise. 🎯 Master the art of reconnaissance, brute-force attacks, and privilege escalation in this hands-on Linux exploitation scenario.
Launch your dedicated machine to begin hacking
Get guided questions that coach you through the lab, teaching you the right techniques along the way.
Create a free account to start your own dedicated server, submit flags, and earn points on the leaderboard.
Start Hacking FreeChoose how you want to get started
Sign in to your account