Skip to main content

RCE (Remote Code Execution)

A critical vulnerability class that allows an attacker to execute arbitrary code on a remote system, often leading to full system compromise.

vulnerability exploitation
Practice Challenges 2 categories
Related Labs 5 labs
Logger

Logger

Easy Code Execution

Logger is a medium-difficulty Linux CTF challenge that revolves around a misconfigured internal log management system. Participants begin by authenticating to a web interface, where they must identify and exploit a Remote Code Execution (RCE) vulnerability.

PRO
Staging

Staging

Medium Security Misconfiguration

Staging is a medium-difficulty Linux CTF where you brute-force hidden vhosts, spin up a remote database to configure an uninitialized WordPress, then exploit misconfigurations for initial access. From there, you reuse credentials and abuse sudo misconfigs to gain root. It mimics real-world staging pitfalls in poorly managed environments.

PRO
Rejetto

Rejetto

Easy Server Side Template Injection

A classic file-sharing service hums along, offering simple access to a few public resources. It looks stable, even nostalgic, perhaps a relic from another era. But age often brings oversight. Explore its behavior, peek into its features, and you might just find something that wasn???t meant to be shared

PRO
Wallstreet Hijack

Wallstreet Hijack

Hard Replay Attacks

The gRPC stock trading service lacks robust protections against replay attacks. Exploit the weak security mechanisms to replay valid trade requests and manipulate stock values. Can you gain unauthorized profits by intercepting and replaying gRPC messages?

PRO
Chatter

Chatter

Medium Insecure Sockets

Play around with websockets, intercept messages, enumerate API endpoints and more with this awesome vulnerable chat API. Do you have what it takes to hack this API?

PRO
View all labs →
Blue Team Labs 3
Using Autopsy

Using Autopsy

Beginner Digital Forensics

In the Autopsy Digital Forensics Lab, participants take on the role of a digital forensics investigator tasked with analyzing digital evidence to uncover critical information in a simulated investigation. Using Autopsy, a widely-used, open-source digital forensics platform, participants will work with a provided file to investigate various aspects of its contents, metadata, and potential artifacts. This hands-on lab immerses participants in real-world forensic challenges, allowing them to extract and analyze file system data, recover deleted files, and identify evidence of suspicious or malicious activity. Through practical exercises, participants will gain experience in examining file structures, applying investigative techniques, and generating reports to document findings. By the end of the lab, they will be well-prepared to leverage Autopsy for forensic analysis in real-world scenarios and effectively contribute to digital investigations.

BLUE TEAM
Snort IDS

Snort IDS

Beginner Security Operations

In the Snort Blue Team Lab, participants assume the role of a blue team defender tasked with securing a corporate network using Snort, a popular open-source Intrusion Detection System (IDS). This immersive, hands-on lab simulates real-world network security challenges where attackers are attempting to breach the network through various techniques, including port scans, malicious payloads, and suspicious network traffic. Participants will learn to configure and deploy Snort rules, analyze network traffic for indicators of compromise (IoCs), and implement effective detection strategies to identify and respond to potential threats. By the end of the lab, participants will have a solid understanding of how to use Snort to protect an organization from network-based attacks and improve overall security posture. To use this lab you will need to be connected to the Professional Labs VPN!

BLUE TEAM
Wazuh SIEM

Wazuh SIEM

Beginner Security Operations

Wazuh is an open-source security information and event management (SIEM) solution that provides comprehensive security monitoring and management capabilities. It integrates various security tools and techniques to help organizations detect threats, monitor infrastructure, and ensure compliance with security policies. In this lab you will learn how to use a SIEM to identify various malicious actions that have happened on endpoint.

BLUE TEAM
Active CTF Events 3
View all events →
Related Terms 12

Ready to learn RCE hands-on?

Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.

Get Started Free