Lab Icon

Scheduled Sabotage

Can you exploit the scheduled task?

A backup server hums quietly, running its automated maintenance tasks on schedule. But are those scheduled tasks really secure? SSH in, enumerate the system like a real pentester, and discover how a simple misconfiguration can lead to complete system compromise. Time is ticking, the cron job runs every minute!

2
Flags
20
Points
35%
Success Rate
Start Your Challenge
~1-2 min setup
Dedicated server
Private instance
Industry standard

Stuck? Get the Solution

Stop wasting hours. Get the official step-by-step walkthrough and learn the right techniques.

All solutions Learning Mode Unlimited hints Archived labs

Ready to hack this lab?

Create a free account to start your own dedicated server, submit flags, and earn points on the leaderboard.

Start Hacking Free
Join 5,000+ hackers learning cybersecurity with hands-on labs. Create Account