Scenarios

Choose your mission. Every run is different.

Red Team — Beginner

Ops Room: Lost Key

Beginner

A key has gone missing on a production server. Find it before someone else does.

LinuxFile DiscoverySSH
30 minEvery session unique
Launch

Intel Gathering: Network Mapping

Beginner

Map the network. Identify services. Build your target profile.

NmapService EnumerationRecon
30 minEvery session unique
Launch

Broken Permissions: Sudo Escape

Beginner

The sysadmin gave you sudo access to read logs. They shouldn't have.

SudoShell EscapePrivilege Escalation
< 20 minEvery session unique
Launch

Careless Dev: Key Hunt

Beginner

A developer left their SSH key where anyone can read it. Find it. Use it.

SSH KeysCredential TheftEnumeration
< 20 minEvery session unique
Launch

Legacy FTP Drop

Beginner

An old FTP server with forgotten files. What secrets did they leave behind?

FTPFile AnalysisOSINT
30 minEvery session unique
Launch

Red Team — Intermediate

Elevation: SUID Hunt

Intermediate

You have a shell. Now get root. The SUID bits tell a story.

Privilege EscalationSUIDLinux
30-60 minEvery session unique
Launch

Web Breach: Data Extraction

Intermediate

The web app is leaking. Extract the data before they patch it.

SQL InjectionWeb AppData Extraction
30-60 minEvery session unique
Launch

Container Breakout: Writable Passwd

Intermediate

The previous admin was sloppy with container permissions. Exploit it.

DockerFile Permissions/etc/passwd
30 minEvery session unique
Launch

Timed Strike: Cron Injection

Intermediate

A root cron job executes a world-writable script. Inject your payload.

Cron JobsScript InjectionPersistence
30 minEvery session unique
Launch

Blue Team — Incident Response

Incident Response: The Miner

Advanced

CPU at 90%. Something is mining crypto on your server. Find it. Kill it. Clean it.

Incident ResponseCrypto MiningPersistence
30 minEvery session unique
Launch

Incident Response: The Web Shell

Advanced

The WAF flagged suspicious PHP uploads. Find the shell. Trace the damage.

Incident ResponseWeb ShellLog Analysis
30 minEvery session unique
Launch

Incident Response: The Backdoor

Advanced

Outbound C2 traffic detected. An attacker left a backdoor. Hunt it down.

Incident ResponseSSH BackdoorReverse Shell
30 minEvery session unique
Launch

Advanced & DAEMON

DAEMON: Meet the Operator

Nightmare

Can you root a box that's fighting back? The admin knows you're here.

DAEMON ModeActive DefenseAdversarial AI
30 minEvery session unique
Enter DAEMON Mode

Coming Soon

DAEMON: HAL 9000

I'm sorry, Dave. I can't let you read that file.

NightmareComing Soon

Incident Response: Ransomware

The files are encrypted. The clock is ticking.

AdvancedComing Soon