Practice and develop your coding skills by building real live interactive autograded projects with solutions and video tutorials
3hrs average
In this final cybersecurity project, students must take immediate action to identify, contain, and remediate a live cyberattack on a compromised Linux server. Acting as cybersecurity analysts, they will investigate malicious processes, identify persistence mechanisms, remove backdoors, and restore system integrity.
Intermediate
2hrs average
Explore a realistic vulnerability in a WordPress site by identifying and analyzing the vulnerable TimThumb script. Learn to recognize suspicious paths and formulate attack hypotheses.
Intermediate
2hrs average
Access a corporate Linux system and use brute force and privilege escalation techniques to become root and retrieve a protected flag.
Intermediate
2hrs average
Gain Administrator access to a Windows machine using an NTLM hash exposed in a public SMB share. Learn to exploit insecure configurations and perform Pass-the-Hash authentication.
Intermediate
2hrs average
Exploit a SQL Injection vulnerability in a dating app to access as admin, retrieve credentials, uncover hidden secrets, and escalate privileges to gain root access.
Intermediate
2hrs average
Learn to exploit a vulnerable file upload form to deploy a reverse shell, gain control of the server, and capture a flag. This lab provides a realistic simulation of a common initial access technique used by attackers and highlights the importance of implementing proper security controls on file upload features.
Intermediate
3hrs average
Learn how to create an AI chatbot that mimics your personality using Chatbase, interact with it, and share it with the world in a viral post.
Intermediate
2hrs average
Analyze a web server full of decoys, discover an exposed backup file, and exploit a misconfigured scheduled task to escalate privileges in a Windows system.
Intermediate
2hrs average
Explore a Windows server hosting a WordPress site and vulnerable SMB shares. Enumerate users, build custom dictionaries, and use discovered credentials to capture a flag.
Intermediate
2hrs average
Analyze a casino web app and exploit a Local File Inclusion (LFI) vulnerability to access sensitive server content.
Intermediate
2hrs average
Analyze a Windows 7 system vulnerable to EternalBlue, exploit the flaw using Metasploit, and remotely access the system to retrieve a flag from the user's desktop.
Intermediate
2hrs average
Learn to perform brute force attacks and privilege escalation in a controlled environment using tools like Hydra and password dictionaries.
Intermediate
2hrs average
Learn how to identify a vulnerable Linux kernel and exploit the Dirty Cow vulnerability (CVE-2016-5195) to escalate privileges in a realistic lab environment.
Intermediate
4hrs average
Develop a frontend Inventory Management App using React and TypeScript, integrating it with a FastAPI backend. Learn to manage inventory items with CRUD operations and enhance the app with styling and navigation.
Intermediate
2hrs average
Learn to intercept unencrypted HTTP traffic, identify information leaks, and access FTP services using hashes and decoding techniques.
Intermediate
2hrs average
Explore a corporate Windows server, identify poor security practices, and perform brute force attacks to access a privileged user and escalate to administrator.
Intermediate
2hrs average
Investigate a web application vulnerable to SQL Injection, access internal data from the Alabama Suites hotel system, and uncover who is sabotaging Diego by analyzing user panels.
Intermediate
2hrs average
Explore a web application to detect hidden routes and broken access control. Crack MD5 passwords and simulate logins to retrieve sensitive information.
Intermediate
2hrs average
In this lab, you'll analyze a website for poor development practices, discover exposed credentials, and access via SSH to retrieve a flag.
Intermediate
5hrs average
Build a supervised classification model to predict whether a person will surpass a certain annual income threshold based on demographic data, and develop an interpretative recommendation system that suggests alternative paths to improve their situation.
Intermediate