
SmartyPants
CHALLENGE DESCRIPTION Forela’s CTO, Dutch, stores important files on a separate Windows system because the domain environment at Forela is frequently breached due to its exposure across various ind...

CHALLENGE DESCRIPTION Forela’s CTO, Dutch, stores important files on a separate Windows system because the domain environment at Forela is frequently breached due to its exposure across various ind...

Machine Information Keeper is an easy-difficulty Linux machine that features a support ticketing system that uses default credentials. Enumerating the service, we are able to see clear text creden...

Machine Information Wifinetic is an easy difficulty Linux machine which presents an intriguing network challenge, focusing on wireless security and network monitoring. An exposed FTP service has a...

Machine Information Netmon is an easy difficulty Windows box with simple enumeration and exploitation. PRTG is running, and an FTP server with anonymous access allows reading of PRTG Network Monit...

Machine Information Legacy is a fairly straightforward beginner-level machine which demonstrates the potential security risks of SMB on Windows. Only one publicly available exploit is required to ...

CHALLENGE DESCRIPTION As a fast-growing startup, Forela has been utilising a business management platform. Unfortunately, our documentation is scarce, and our administrators aren’t the most securit...

We live in an era where getting stuck on a semicolon can lead to a Google search spiral, 5 tabs of Stack Overflow, and a YouTube tutorial breakdown. But step back a few decades, and you’ll find a d...

CHALLENGE DESCRIPTION Khalid has just logged onto a host that he and his team use as a testing host for many different purposes. It’s off their corporate network but has access to lots of resources...

CHALLENGE DESCRIPTION We’ve identified an unusual pattern in our network activity, indicating a possible security breach. Our team suspects an unauthorized intrusion into our systems, potentially c...

CHALLENGE DESCRIPTION Our SOC team detected suspicious activity in Network Traffic, the machine has been compromised and company information that should not have been there has now been stolen – it...