|
IAM Exploitation
|
Cloud Pentesting |
10 |
|
|
Cloud Secret Extraction
|
Cloud Pentesting |
10 |
|
|
IaaS Exploitation
|
Cloud Pentesting |
10 |
|
|
Cloud Storage Services 1
|
Cloud Pentesting |
10 |
|
|
FaaS Exploitation 2
|
Cloud Pentesting |
10 |
|
|
FaaS Exploitation
|
Cloud Pentesting |
10 |
|
|
VLAN 4
|
VPN / VoIP / VPN Hacking |
10 |
|
|
VLAN 3
|
VPN / VoIP / VPN Hacking |
10 |
|
|
VLAN 2
|
VPN / VoIP / VPN Hacking |
10 |
|
|
VLAN 1
|
VPN / VoIP / VPN Hacking |
10 |
|
|
VPN 1
|
VPN / VoIP / VPN Hacking |
10 |
|
|
VPN 2
|
VPN / VoIP / VPN Hacking |
10 |
|
|
Deserialization Exploit
|
Web Technologies |
10 |
|
|
Oracle Database Exploitation
|
Web Technologies |
10 |
|
|
MySQL Database
|
Web Technologies |
10 |
|
|
Oracle Database Enumeration
|
Web Technologies |
10 |
|
|
Java Deserialization Exploits
|
Web Technologies |
10 |
|
|
Docker Breakout 2
|
Container Technologies |
10 |
|
|
*nix post exploitation
|
Hacking *nix |
10 |
|
|
Docker Breakout 1
|
Container Technologies |
10 |
|
|
Mongo DB
|
Hacking *nix |
10 |
|
|
X11
|
Hacking *nix |
10 |
|
|
Privilege Escalation
|
Hacking *nix |
10 |
|
|
Privilege Escalation
|
Hacking *nix |
10 |
|
|
Privilege Escalation
|
Hacking *nix |
10 |
|
|
Shell Breakout
|
Hacking *nix |
10 |
|
|
Shell Breakout
|
Hacking *nix |
10 |
|
|
Cross Forest Trust Abuse: FSP
|
Hacking Windows |
10 |
|
|
Cross Forest Trust Abuse: Kerberoasting
|
Hacking Windows |
10 |
|
|
Lateral Movement 2
|
Hacking Windows |
10 |
|
|
Lateral Movement 1
|
Hacking Windows |
10 |
|
|
Privilege Escalation via Credentials Harvesting
|
Hacking Windows |
10 |
|
|
Privilege Escalation via in-memory credentials
|
Hacking Windows |
10 |
|
|
Pivoting 1
|
Hacking Windows |
10 |
|
|
Postgres Database
|
Web Technologies |
10 |
|
|
Pivoting
|
Hacking Windows |
10 |
|
|
AD Delegation 2
|
Hacking Windows |
10 |
|
|
AD Delegation
|
Hacking Windows |
10 |
|
|
Privilege Escalation to Sysadmin
|
Hacking Windows |
10 |
|
|
Windows Enumeration
|
Hacking Windows |
10 |
|
|
Continuous Integration Server Exploitation
|
Web Technologies |
10 |
|
|
Distributed Version Control Systems
|
Web Technologies |
10 |
|
|
Open Source Intelligence Exploitation
|
Discovery |
10 |
|
|
Open Source Intelligence Gathering
|
Discovery |
10 |
|
|
Service Exploitation
|
Discovery |
10 |
|
|
Network Mapping
|
Discovery |
10 |
|