Lab Icon

Scheduled Sabotage

Can you exploit the scheduled task?

Easy Atualizado em 26 jan. 2026 Acesso Gratuito Solução (Pro)

A backup server hums quietly, running its automated maintenance tasks on schedule. But are those scheduled tasks really secure? SSH in, enumerate the system like a real pentester, and discover how a simple misconfiguration can lead to complete system compromise. Time is ticking, the cron job runs every minute!

2
Flags
20
Pontos
60%
Taxa de Sucesso
Start Your Challenge

Launch your dedicated machine to begin hacking

~1-2 min setup
Dedicated server
Private instance
Industry standard

Learn From the Community

Discover different approaches and techniques from hackers who completed this lab.

All writeups Solutions Unlimited hints Archived labs

Ready to hack this lab?

Create a free account to start your own dedicated server, submit flags, and earn points on the leaderboard.

Começar a Hackear Grátis
Junte-se a 5.000+ hackers aprendendo cibersegurança com labs práticos. Criar Conta