Lab Icon

Scheduled Sabotage

Can you exploit the scheduled task?

Easy Updated 25 Jan 2026 Free Access Solution (Pro)

A backup server hums quietly, running its automated maintenance tasks on schedule. But are those scheduled tasks really secure? SSH in, enumerate the system like a real pentester, and discover how a simple misconfiguration can lead to complete system compromise. Time is ticking, the cron job runs every minute!

2
Flags
20
Points
50%
Success Rate
Start Your Challenge

Launch your dedicated machine to begin hacking

~1-2 min setup
Dedicated server
Private instance
Industry standard
Open the target and find the flags
User Flag
+10 pts
Open the target and find the flags
Root Flag
+10 pts

Ready to hack this lab?

Create a free account to start your own dedicated server, submit flags, and earn points on the leaderboard.

Start Hacking Free
Join 5,000+ hackers learning cybersecurity with hands-on labs. Create Account