Microsoft's widely-used operating system family for desktops and servers. Active Directory, PowerShell, and Windows-specific protocols (SMB, RDP, Kerberos) are key areas for security testing.
One Click
An end user has installed some software that was not approved on the ITs list. This resulted in a vulnerability being exposed, can you exploit this windows machine?
PRO
Simple
Step into this Windows 10 labyrinth with RDP and a few surprise services open. Navigate the quirky challenges, uncover hidden secrets, and see if you can outsmart the simplicity to capture the flag!
PROPut theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free