Lab User
Profile Logout
Profile Logout
Bug Report Support
  • Dashboard
  • Search
  • Ongoing Labs 0
  • Latest Additions
  • Community Labs
  • Earn Credentials
  • Verifiable Badges
  • Windows Security
  • Reconnaissance
    • Getting Started
    • Host Discovery
    • SMB
    • MSSQL
    • IIS
  • Basic Exploitation
    • With Metasploit
    • Pentesting
  • Post Exploitation
    • With Metasploit
  • Service Exploitation
    • RDP
    • SMB
    • WinRM
    • WMI
    • MSSQL
    • IIS
  • Privilege Escalation
    • Basic
  • Maintaining Access
    • Basics
  • Cloud Security
  • AWS Cloud Security
    • IAM
    • S3
    • DynamoDB
    • API Gateway
    • Lambda
    • Databases
    • EC2
    • ECS and ECR
    • Defense
  • Bootcamp
    • Recordings
  • Linux Security
  • Linux Basics
    • Getting Started
    • Basics
  • Reconnaissance
    • Getting Started
    • Memcached
    • Webservers
    • DNS
    • SQL Databases
    • FTP Servers
    • Web Applications
  • Exploitation
    • Getting Started
    • Metasploit
    • Password Cracking
    • Web Applications
  • Post Exploitation
    • Getting Started
    • Metasploit Post Modules
    • Browser Forensics
    • Lateral Movement
  • Privilege Escalation
    • Getting Started
    • Basic
  • Pivoting
    • Getting Started
    • Basics
  • Maintaining Access
    • Getting Started
    • Basics
  • MITRE ATTACK
    • Getting Started
    • Discovery
    • Credential Access
    • Privilege Escalation
    • Persistence
    • Lateral Movement
    • Defense Evasion
    • Command and Control
  • Exploit Research
    • Getting Started
    • Buffer Overflow
  • Bootcamp
    • Recordings
  • WebApp Pentesting Basics
  • Web Application Basics
    • Getting Started
    • Basics
  • Tools of the Trade
    • Getting Started
    • Basics
  • OWASP Top 10
    • Injection
    • Broken Authentication
    • Sensitive Data Exposure
    • XML External Entities
    • Broken Access Control
    • Security Misconfiguration
    • Cross Site Scripting
    • Insecure Deserialization
    • Vulnerable Components
    • Insufficient Logging
  • Webapp CVEs
    • Getting Started
    • Basics
  • Bootcamp
    • Recordings
  • Advanced Priv-Esc
  • Windows
    • Getting Started
    • UAC Bypass
    • DLL Hijacking
  • Linux
    • Getting Started
    • Linux Capabilities
    • AppArmor
    • Seccomp
  • Container Security
  • Intro to Containers
    • Getting Started
    • Container Basics
    • Docker Microservices
  • Container/Host Security
    • Container Breakouts
    • Docker Host Attacks
    • Docker API Firewall
  • Docker Image Security
    • Docker Registry
    • Docker Image Analysis
    • Docker Forensics
    • Dockerfile Linting
  • Miscellaneous
    • Docker Security Tools
  • Securing Docker
    • Securing Docker
  • Bootcamp
    • Recordings
  • DevSecOps
  • DevOps Basics
    • Getting Started
    • Version Control Systems
    • Testing
    • Building Project
    • Continuous Integration
    • Infrastructure as Code
  • DevSecOps Basics
    • Getting Started
    • Automated Code Review
    • Sensitive Information Scan
    • Static Application Security Testing
    • Dynamic Application Security Testing
    • Software Composition Analysis
    • Compliance as Code
    • Vulnerability Management
    • Secret Management
  • Pipeline Basics
    • Getting Started
    • Web Applications
    • Software
  • Fix The Code
    • Web Applications
  • Bootcamp
    • Recordings
  • WiFi Security
  • Basics
    • Getting Started
    • Traffic Analysis
    • Reconnaissance
    • AP Client Basics
    • OpenWRT Router
    • Tools
  • Personal Networks
    • Offline Cracking
    • Live Cracking
  • Enterprise Networks
    • Offline Cracking
    • Live Cracking
    • WiFi Pivoting
  • Advanced Labs
    • Python Scripting
    • AP Backdoors
    • Custom Firmware
  • Forensics
    • Basics
  • Bootcamp
    • Recordings
  • Reverse Engineering
  • Linux
    • GDB Basics
    • Static Binary Analysis
  • Password Cracking
  • Hashes
    • Getting Started
    • Basics
  • File Passwords
    • Basics
  • Forensics
  • Disk Forensics
    • Getting Started
    • Basics
  • Memory Forensics
    • Basics
  • Offensive Python
  • Interacting with Files
    • Getting Started
    • Password Cracking
    • File Metadata
    • PCAP Analysis
  • Live Interactions
    • Server Attacks
    • Debugging
    • Client Emulation
    • Server Emulation
  • IoT Security
  • Device Attacks
    • Getting Started
    • Bootloader
  • Network Attacks
    • MQTT
    • AMQP
  • Other Topics
  • Network Recon
    • Webservers
    • SQL Databases
    • NoSQL Databases
    • Distributed Databases
    • Distributed Queues
    • Proxy Servers
    • SMTP Servers
    • POP3 Servers
    • IMAP Servers
    • SIEM Platforms
    • SMB Servers
    • SSH Servers
    • Telnet Servers
    • NTP Servers
    • TFTP Servers
    • IRC Servers
    • Finger Servers
    • RADIUS
    • VNC
    • SNMP
  • Real World WebApps
    • Remote Code Execution
    • Stored XSS
    • File Upload
    • SQL Injection
    • XML External Entity
    • SSRF
    • SSTI
    • Command Injection
    • Local File Inclusion
    • Reflected XSS
    • CSRF
    • Arbitrary File Download
    • Directory Traversal
    • Broken Authentication
  • Traffic Analysis
    • Tshark Fu
  • WebApp CVEs
    • 2022
    • 2021
    • 2020
    • 2019
    • 2018
    • 2017
    • 2016
    • Older CVEs
  • Metasploit
    • Windows Apps Exploits
    • Linux Exploitation
    • Meterpreter
    • Post Modules
    • Metasploit CTFs
    • Metasploit Pivot CTFs
    • Latest Targets
    • WordPress Exploitation
    • Pivoting
    • Auxiliary Modules
    • WebApp Exploits
  • Network Pivoting
    • Single Pivots
  • Infrastructure Attacks
    • Memcached
    • Squid Proxy
    • MongoDB
    • Apache
    • Nginx
  • Privilege Escalation
    • Linux
    • Web to Root
    • App to root
    • Linux Capabilities
  • Deliberately Vulnerable
    • Web Apps
  • Forensics
    • Browser
  • Firmware Analysis
    • Wi-Fi Routers
  • Secure Coding
    • Web Application
    • Ruby
    • Python
  • Malware Analysis
    • Simple Samples
  • DevSecOps
    • CI/CD Tools
  • Code Repositories
    • Git
    • Python PyPi
    • APT Repository
  • Endpoint Security
    • osquery
    • OSQuery MITRE
    • Sysdig
    • Malware Scanner
    • HIDS
  • Persistence
    • Maintaining Access
    • Data Exfiltration
  • Linux Runtime Analysis
    • Profiling Tools
  • Log Analysis
    • Webserver Logs
    • SSH Logs
    • Proxy Logs
    • DNS Logs
    • Windows Event Logs
    • Other Tools
  • REST
    • JWT Basics
    • JWT Advanced
    • JWT Expert
    • API Security
    • GraphQL
  • MITRE ATTACK Linux
    • Discovery
    • Credential Access
    • Persistence
    • Privilege Escalation
  • Service Exploitation
    • Linux Services
    • WebApp Frameworks
  • Web Technologies
    • WebSockets
    • Bot Attack
  • Android Pentesting
    • Basics
  • OWASP Top 10
    • Single Page Applications
    • Getting Started
  • Network Pentesting
    • DNS
    • Git
    • Recon
    • Subversion (SVN)
  • Advanced Exercises
  • Weekly CTF
    • All
  • Capture the Flags
    • One Target
    • Two Targets
    • Three Targets
    • Four Targets
    • Mega Mystery
  • PA Course Labs
  • Tshark Unleashed
    • Course Labs
  • Python For Pentesters
    • Course Labs
  • VoIP Traffic Analysis
    • Course Labs
  • Javascript For Pentesters
    • Course Labs
  • Pandas For Pentesters
    • Course Labs
  • Embedded/IoT Linux
    • Course Labs
  • WAP Challenges
    • Course Labs
  • Web App Pentesting
    • Course Labs
  • Pentesting Challenges
    • Course Labs
  • x86 Asm and Shellcoding
    • Course Labs
  • x86_64 Asm and Shellcoding
    • Course Labs
  • GNU Debugger
    • Course Labs
  • Data Science and Machine Learning for InfoSec
    • Course Labs
  • Coming Soon
  • Win Badges
    • Tshark: Basics Badge
    • Password Cracking: Basics Badge
    • OSQuery: Basics Badge
    • Recon: Basics Badge
    • Privilege Escalation: Basic Badge
    • VoIP Traffic Analysis: Basics Badge
    • Memory Forensics: Basics Badge
    • Network Pentesting: Basics Badge
    • Network Scanning: Basics Badge
    • WiFi: Basic Badge
    • Docker Forensics: Basic Badge
    • WebApps CVE: Basics Badge
    • JWT: Basics Badge
    • Docker Security: Basics Badge
    • AppArmor: Basics Badge
    • Python: Basic Badge
    • Firmware Analysis: Basic Badge
    • Single Page Application: Basic badge
    • Windows Services Security: Basic Badge
    • IoT Security: Basics Badge
    • Infrastructure Security: Basics Badge
    • MITRE ATTACK: Basics Badge
    • Repositories: Basics Badge
    • DevSecOps: Basics Badge
    • Windows Post Exploitation: Basics Badge
    • API Security: Basics Badge
    • Privilege Escalation: Intermediate Badge
    • VoIP Traffic Analysis: Intermediate Badge
    • WiFi: Intermediate Badge
    • WebApps CVE: Intermediate Badge
    • WiFi: Advanced Badge
    • API Security: Advanced Badge
    • Container Security: Beginner Edition
  • Earn Certificates
  1. Dashboard

User Avatar

Malware I

  • Privacy Policy
  • ToS
Copyright © 2018-2019. All right reserved.