A critical vulnerability class that allows an attacker to execute arbitrary code on a remote system, often leading to full system compromise.
Logger
Logger is a medium-difficulty Linux CTF challenge that revolves around a misconfigured internal log management system. Participants begin by authenticating to a web interface, where they must identify and exploit a Remote Code Execution (RCE) vulnerability.
PRO
Staging
Staging is a medium-difficulty Linux CTF where you brute-force hidden vhosts, spin up a remote database to configure an uninitialized WordPress, then exploit misconfigurations for initial access. From there, you reuse credentials and abuse sudo misconfigs to gain root. It mimics real-world staging pitfalls in poorly managed environments.
PRO
Rejetto
A classic file-sharing service hums along, offering simple access to a few public resources. It looks stable, even nostalgic, perhaps a relic from another era. But age often brings oversight. Explore its behavior, peek into its features, and you might just find something that wasn???t meant to be shared
PRO
Wallstreet Hijack
The gRPC stock trading service lacks robust protections against replay attacks. Exploit the weak security mechanisms to replay valid trade requests and manipulate stock values. Can you gain unauthorized profits by intercepting and replaying gRPC messages?
PRO
Chatter
Play around with websockets, intercept messages, enumerate API endpoints and more with this awesome vulnerable chat API. Do you have what it takes to hack this API?
PRO
Using Autopsy
In the Autopsy Digital Forensics Lab, participants take on the role of a digital forensics investigator tasked with analyzing digital evidence to uncover critical information in a simulated investigation. Using Autopsy, a widely-used, open-source digital forensics platform, participants will work with a provided file to investigate various aspects of its contents, metadata, and potential artifacts. This hands-on lab immerses participants in real-world forensic challenges, allowing them to extract and analyze file system data, recover deleted files, and identify evidence of suspicious or malicious activity. Through practical exercises, participants will gain experience in examining file structures, applying investigative techniques, and generating reports to document findings. By the end of the lab, they will be well-prepared to leverage Autopsy for forensic analysis in real-world scenarios and effectively contribute to digital investigations.
BLUE TEAM
Snort IDS
In the Snort Blue Team Lab, participants assume the role of a blue team defender tasked with securing a corporate network using Snort, a popular open-source Intrusion Detection System (IDS). This immersive, hands-on lab simulates real-world network security challenges where attackers are attempting to breach the network through various techniques, including port scans, malicious payloads, and suspicious network traffic. Participants will learn to configure and deploy Snort rules, analyze network traffic for indicators of compromise (IoCs), and implement effective detection strategies to identify and respond to potential threats. By the end of the lab, participants will have a solid understanding of how to use Snort to protect an organization from network-based attacks and improve overall security posture. To use this lab you will need to be connected to the Professional Labs VPN!
BLUE TEAM
Wazuh SIEM
Wazuh is an open-source security information and event management (SIEM) solution that provides comprehensive security monitoring and management capabilities. It integrates various security tools and techniques to help organizations detect threats, monitor infrastructure, and ensure compliance with security policies. In this lab you will learn how to use a SIEM to identify various malicious actions that have happened on endpoint.
BLUE TEAMPut theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free