Skip to main content
March-2024 Updates - New Exclusive Content
Diablo avatar
Written by Diablo
Updated over 6 months ago

We’ve introduced two new exclusive and four training Machines and two exclusive Sherlocks to Dedicated Labs.


NEW EXCLUSIVE MACHINES

CityOfRock:

Difficulty

Very Easy - Penetration Testing Level 1

Areas of Interest

CVE

Technologies

JetBrains, TeamCity

Languages

JAVA

Skills

Enumeration, Unix command usage

CVSS Score

9.8 (Critical)

Borealis:

Difficulty

Easy - Penetration Tester Level 1

Areas of Interest

EDR

Technologies

Windows

Languages

C

Skills

Enumeration, Basic Windows knowledge, Basic EDR knowledge


NEW TRAINING MACHINES

The retired community machines from 20th January to 20th February are detailed below.

  • Visual

    • a Medium Windows Machine featuring a web service that accepts user-submitted .NET 6.0 project repositories, building and returning the executables

  • CozyHosting

    • An easy-difficulty Linux Machine that features a Spring Boot application. The application has the Actuator endpoint enabled.

  • Appsanity

    • A hard-difficulty Windows Machine focused on application misconfigurations both on the web and locally.

  • Manager

    • A medium-difficulty Windows Machine that hosts an Active Directory environment with AD CS (Active Directory Certificate Services), a web server, and an SQL server.


Exclusive Sherlocks

Carson

Difficulty

Easy

Category

Harden

Technology

Linux, Webutler

As a digital forensics investigator, you receive a distress call from a client who operates a website using the WeButler software suite. The client reports that they are unable to log into the web interface to make modifications to their website. Concerned about a potential security breach, they seek your expertise to investigate the issue and restore access to their system.

MonikerD

Difficulty

Very Easy

Category

DFIR

Technology

Windows, Microsoft Outlook

In the bustling metropolis of NeoCity, Damian, a diligent IT specialist, finds himself at the heart of a cunning cyberattack when a shadowy hacker sends him a seemingly innocuous email, leading him to inadvertently click a disguised link, granting access to his system and allowing the attacker to extract valuable NTLM hashes. Unaware of the impending threat, Damian continues his tasks until he notices anomalies within his network, prompting him to spring into action, initiating emergency protocols to contain the breach and fortify his defenses. It is your job to investigate this incident,identify the attack path that the attacker has used, and help Damian carry on with business as normal.


Looking for more content, features, or a place to leave feedback?

Book your spot for a 15-minute call where we can discuss how to level up your training!

Did this answer your question?