A backup server hums quietly, running its automated maintenance tasks on schedule. But are those scheduled tasks really secure? SSH in, enumerate the system like a real pentester, and discover how a simple misconfiguration can lead to complete system compromise. Time is ticking, the cron job runs every minute!
Launch your dedicated machine to begin hacking
Discover different approaches and techniques from hackers who completed this lab.
Create a free account to start your own dedicated server, submit flags, and earn points on the leaderboard.
Commencer à Hacker GratuitementChoisissez comment vous voulez commencer
Connectez-vous à votre compte