Skip to main content

Linux

An open-source operating system family widely used in servers, security tools, and embedded devices. Most hacking tools and security distributions are Linux-based.

infrastructure tools
Practice Challenges 3 categories
Related Labs 6 labs
TimeKeeper

TimeKeeper

Hard File Upload

TimeKeeper is a compact Linux CTF machine modeled as a time-tracking web service. Players will need to investigate the application and host to progress through layered challenges that exercise web application analysis and local privilege escalation.

FREE
NoteVault

NoteVault

Easy File Upload

NoteVault is a Linux CTF machine where persistence meets curiosity. A seemingly simple note-keeping service hides unexpected behaviors, and careful exploration of the system may reveal unconventional ways to turn small wins into full control.

FREE
Logger

Logger

Easy Code Execution

Logger is a medium-difficulty Linux CTF challenge that revolves around a misconfigured internal log management system. Participants begin by authenticating to a web interface, where they must identify and exploit a Remote Code Execution (RCE) vulnerability.

PRO
PwnDoc

PwnDoc

Easy CVE

PwnDoc is an easy-level Linux machine that focuses on web exploitation techniques and Docker-based privilege escalation.

PRO
Staging

Staging

Medium Security Misconfiguration

Staging is a medium-difficulty Linux CTF where you brute-force hidden vhosts, spin up a remote database to configure an uninitialized WordPress, then exploit misconfigurations for initial access. From there, you reuse credentials and abuse sudo misconfigs to gain root. It mimics real-world staging pitfalls in poorly managed environments.

PRO
Zorlang

Zorlang

Medium CVE

Zorlang is a Linux-based CTF machine designed to challenge a player???s skills in exploiting modern vulnerabilities and navigating post-exploitation scenarios. Players must gain an initial foothold by targeting an exposed service and then proceed to enumerate internal services to pivot deeper into the network. Success requires effective use of SSH tunneling techniques and a final privilege escalation through a misconfigured or vulnerable internal component, ultimately leading to full system compromise.

PRO
View all labs →
Active CTF Events 3
View all events →
Related Terms 12

Ready to learn Linux hands-on?

Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.

Get Started Free