Lab Icon

Scheduled Sabotage

Can you exploit the scheduled task?

Easy Updated 26 Jan 2026 Free Access Solution (Pro)

A backup server hums quietly, running its automated maintenance tasks on schedule. But are those scheduled tasks really secure? SSH in, enumerate the system like a real pentester, and discover how a simple misconfiguration can lead to complete system compromise. Time is ticking, the cron job runs every minute!

2
Flags
20
Points
56%
Success Rate
Start Your Challenge

Launch your dedicated machine to begin hacking

~1-2 min setup
Dedicated server
Private instance
Industry standard

Stuck? Get the Solution

Stop wasting hours. Get the official step-by-step walkthrough and learn the right techniques.

All solutions Learning Mode Unlimited hints Archived labs

Ready to hack this lab?

Create a free account to start your own dedicated server, submit flags, and earn points on the leaderboard.

Start Hacking Free
Join 5,000+ hackers learning cybersecurity with hands-on labs. Create Account