ShadowNode
Easy | HTH | Linux
Web enumeration challenge with weak SSH keys and misconfigured sudo permissions.
Easy | HTH | Linux
Web enumeration challenge with weak SSH keys and misconfigured sudo permissions.
Medium | HTH 2.0 | Active Directory
Domain compromise scenario covering Kerberoasting, SPN abuse, and lateral movement.
Hard | Lab | Cloud
SSRF-to-cloud takeover path with IAM role escalation and secrets pivoting.
Easy | HTH | Docker
Container breakout fundamentals through exposed Docker socket and weak runtime isolation.
Medium | Lab | SIEM
Blue-team style incident timeline where hidden logs reveal stealthy persistence techniques.
Hard | HTH X | Hybrid
Hybrid AD-cloud mission chaining VPN pivot, ADCS abuse, and token replay attacks.