Challenge Board

Browse the full target list

Log in to reveal challenge IPs.

πŸ€πŸ€πŸ€πŸ€ Premium Locked

🧩 CorpNet AD Lab · 2 Machines

CorpNet

A two-machine Active Directory lab. Enumerate the domain controller’s SMB shares and a vulnerable employee portal, then chain credential leaks across both machines to achieve full domain compromise.

πŸ€πŸ€πŸ€πŸ€πŸ€ Premium Locked

🧩 MegaCorp AD Lab · 2 Machines

MegaCorp

A two-machine Active Directory lab focused on MS14-025 (GPP credential harvest). Start with an exposed backup config on the workstation, then pivot to the domain controller via SYSVOL to decrypt the service account password and achieve root.

πŸ€

Limited: online now

Ends in calculating...

Axferia

A forgotten nameserver sits exposed on the network, its zone transfer restrictions never configured. What secrets does its DNS database hold β€” and can you leverage them to walk right through the front door?

IP Hidden until login
Progress - / -
πŸ€

Limited: online now

Ends in calculating...

Listeria

The web server proudly serves its directory tree to anyone who asks. Hidden among the exposed files lies a credential that opens more than just a web page. Look closer β€” the index never lies.

IP Hidden until login
Progress - / -
πŸ€πŸ€

Limited: online now

Ends in calculating...

Bindforge

An enterprise directory left open to anonymous queries. Someone forgot to lock the front gate β€” walk the tree, extract what was never meant to be public, and forge your path all the way to root.

IP Hidden until login
Progress - / -
πŸ€πŸ€

Limited: online now

Ends in calculating...

Rootbase

The database administrator forgot the most important rule: always set a root password. Tap into the exposed data store, recover what was left in plaintext, and pivot your way to full control.

IP Hidden until login
Progress - / -
πŸ€πŸ€πŸ€πŸ€ Premium Locked

Limited: online now

Ends in calculating...

Keyspace

A Redis instance stands wide open β€” no authentication, no firewall, just raw access to an in-memory data store. The question isn't whether you can read it. The question is: can you turn a cache into a root shell?

IP Upgrade required
Progress - / -
πŸ€πŸ€

Limited: online now

Ends in calculating...

Driftsync

An rsync daemon quietly exposes its modules to the world, no credentials required. Dig through the synchronized data, recover what was meant to stay private, and ride the drift all the way to root.

IP Hidden until login
Progress - / -
πŸ€πŸ€πŸ€ Premium Locked

Limited: online now

Ends in calculating...

Bifrost

Two file-sharing services, two attack surfaces. Pivot between SMB and FTP to piece together the credentials that bridge your path to root. Neither service alone holds the answer β€” the key is in the crossing.

IP Upgrade required
Progress - / -
πŸ€πŸ€

Limited: online now

Ends in calculating...

Postmark

The mail server helpfully confirms which users exist β€” and the sysadmin made sure some of them have terrible passwords. Enumerate the recipients, guess the passphrase, and deliver yourself a shell.

IP Hidden until login
Progress - / -
πŸ€πŸ€ Premium Locked

Limited: online now

Ends in calculating...

Walkabout

A network management agent leaks far more than just metrics. Walk the MIB tree, read what the community string reveals, and follow the trail of exposed data straight to a root prompt.

IP Upgrade required
Progress - / -
πŸ€

Retrogate

Cleartext credentials over a legacy protocol β€” some habits never die. Authenticate through the old gateway, find what the sysadmin left behind, and walk the classic escalation path to root.

IP Hidden until login
Progress - / -
πŸ€

Bootleak

A TFTP server meant for network booting inadvertently serves up configuration files to anyone who asks the right filename. One leaked config is all you need β€” find the foothold, then find the path out.

IP Hidden until login
Progress - / -
πŸ€πŸ€ Premium Locked

Neuravex

CorpTech's internal AI assistant has its maintenance credentials baked directly into its system prompt. It's chatty, helpful, and completely unaware of what prompt injection means. Talk to it β€” carefully.

IP Upgrade required
Progress - / -
πŸ€πŸ€πŸ€

Injectrix

An internal employee portal shipped to production without a security review. Three unpatched vulnerabilities sit in the same PHP codebase β€” SQL injection, command injection, and an unrestricted file upload. Chain them to own the box.

IP Hidden until login
Progress - / -
πŸ€πŸ€πŸ€πŸ€ Premium Locked

Stacksmash

A 32-bit SUID binary runs on this machine with every modern mitigation stripped away β€” no canary, no NX, no PIE, no ASLR. One vulnerable call to gets() is all that stands between you and a root shell. Develop the exploit.

IP Upgrade required
Progress - / -
πŸ€πŸ€πŸ€πŸ€πŸ€ Premium Locked

The XSS Rat

The XSS Rat's personal research platform: a PHP blog engine with a dangerous API and a secrets-laden internal service. Chain stored XSS through to SSRF, extract admin credentials from an internal endpoint, and abuse a sudo GTFOBin to root. Nothing about this box is accidental β€” every quirk is a clue.

IP Upgrade required
Progress - / -
Want to learn the methodology behind these labs? The XSS Rat's Endless Bundle includes 45+ courses, CNWPP/CAPIE/CxWAP certs, weekly live sessions, and all future releases β€” 80% off right now.
Get the Bundle