A backup server hums quietly, running its automated maintenance tasks on schedule. But are those scheduled tasks really secure? SSH in, enumerate the system like a real pentester, and discover how a simple misconfiguration can lead to complete system compromise. Time is ticking, the cron job runs every minute!
Launch your dedicated machine to begin hacking
Create a free account to start your own dedicated server, submit flags, and earn points on the leaderboard.
Começar a Hackear GrátisEscolha como deseja começar
Entre na sua conta