Practice Red team

Lessons, exercises, and projects about red team

Browse our list of curated database of projects, exercises, and lessons to learn red team

2hrs average

Final boss Red Team - The Final Corporate Challenge

Analyze a web server full of decoys, discover an exposed backup file, and exploit a misconfigured scheduled task to escalate privileges in a Windows system.

2hrs average

Explore a Windows server hosting a WordPress site and vulnerable SMB shares. Enumerate users, build custom dictionaries, and use discovered credentials to capture a flag.

2hrs average

Analyze a casino web app and exploit a Local File Inclusion (LFI) vulnerability to access sensitive server content.

2hrs average

Exploit a SQL Injection vulnerability in a dating app to access as admin, retrieve credentials, uncover hidden secrets, and escalate privileges to gain root access.

2hrs average

In this lab, you'll analyze a website for poor development practices, discover exposed credentials, and access via SSH to retrieve a flag.

Ready to dive into Cybersecurity? Join our waiting list for an intensive bootcamp, master ethical hacking, and build a standout portfolio for your InfoSec career!

Learn all about Buffer overflow and how to exploit this vulnerability

2hrs average

Learn to intercept unencrypted HTTP traffic, identify information leaks, and access FTP services using hashes and decoding techniques.

2hrs average

Explore a corporate Windows server, identify poor security practices, and perform brute force attacks to access a privileged user and escalate to administrator.

2hrs average

Investigate a web application vulnerable to SQL Injection, access internal data from the Alabama Suites hotel system, and uncover who is sabotaging Diego by analyzing user panels.

2hrs average

Learn to perform brute force attacks and privilege escalation in a controlled environment using tools like Hydra and password dictionaries.

2hrs average

Learn to exploit a vulnerable file upload form to deploy a reverse shell, gain control of the server, and capture a flag. This lab provides a realistic simulation of a common initial access technique used by attackers and highlights the importance of implementing proper security controls on file upload features.

2hrs average

Learn how to perform a buffer overflow exploit vulnerable from a Kali Linux machine.

How Attackers Use Vulnerabilities to Gain System Control and Perform Privilege Escalation Attack

2hrs average

Explore a realistic vulnerability in a WordPress site by identifying and analyzing the vulnerable TimThumb script. Learn to recognize suspicious paths and formulate attack hypotheses.

2hrs average

Access a corporate Linux system and use brute force and privilege escalation techniques to become root and retrieve a protected flag.

2hrs average

Analyze a Windows 7 system vulnerable to EternalBlue, exploit the flaw using Metasploit, and remotely access the system to retrieve a flag from the user's desktop.

2hrs average

In this lab, you'll analyze a website for poor development practices, discover exposed credentials, and access via SSH to retrieve a flag.

2hrs average

Learn how to identify a vulnerable Linux kernel and exploit the Dirty Cow vulnerability (CVE-2016-5195) to escalate privileges in a realistic lab environment.

Mastering Windows Command Line for Remote System Control