Step into the shoes of a penetration tester and tackle this realistic SSH-based challenge. This server might look secure from the outside, but weak credentials and dangerous sudo configurations could be your ticket to complete system compromise. 🎯 Master the art of reconnaissance, brute-force attacks, and privilege escalation in this hands-on Linux exploitation scenario.
Launch your dedicated machine to begin hacking
Get guided questions that coach you through the lab, teaching you the right techniques along the way.
Choose how you want to get started
Sign in to your account