Vulnerable Machines

ShadowNode

Easy | HTH | Linux

Web enumeration challenge with weak SSH keys and misconfigured sudo permissions.

KerberVault

Medium | HTH 2.0 | Active Directory

Domain compromise scenario covering Kerberoasting, SPN abuse, and lateral movement.

CloudFall

Hard | Lab | Cloud

SSRF-to-cloud takeover path with IAM role escalation and secrets pivoting.

CipherDock

Easy | HTH | Docker

Container breakout fundamentals through exposed Docker socket and weak runtime isolation.

ZeroTrace

Medium | Lab | SIEM

Blue-team style incident timeline where hidden logs reveal stealthy persistence techniques.

PhantomGrid

Hard | HTH X | Hybrid

Hybrid AD-cloud mission chaining VPN pivot, ADCS abuse, and token replay attacks.