Changelog

Follow up on the latest improvements and updates.

RSS

The Windows API Monitoring and Hooking module teaches practical monitoring, hooking, and logging techniques used in debugging, reverse engineering, malware analysis, and EDR development all with hands-on labs and a Splunk skills assessment.
Key outcomes include:
  • Trace API calls from user mode into the kernel
  • Hook APIs (IAT, inline/Detours, DLL) and log parameters / returns
  • Monitor via kernel / EDR drivers to detect token abuse and privilege escalation
  • Validate findings with hands-on assessment to query and analyze logged API activity
image
What began as a global gaming craze has turned into something much darker. Millions rushed to adopt AI monster companions, but the lines between play and reality are blurring fast. Malfunctions, outages, even market chaos—the world is starting to feel the bite.
Over the next 13 weeks, face all-new Machines and:
  • Attempt to solve Machines by testing out new techniques
  • Use your existing offensive skills and rise on the leaderboard
  • Earn Seasonal ranks, prizes, and achieve a new personal best
Want to learn more about Seasons? Check out our blog post for all the details.
The first Machine will be released on September 20th.
1200x675 - Blog Visual 1
We’ve added a brand-new Secure Coding challenge category which includes 6 hands-on challenges focused on real-world secure coding practices, ranging from easy to medium difficulty.
Designed for software engineers, AppSec professionals, and security engineers, these challenges help users:
  • Practice identifying and fixing vulnerabilities directly in source code
  • Strengthen secure coding skills across languages like Python, JavaScript, and C/C++
  • Build the ability to spot logic flaws and dangerous patterns early, just like expert-level AppSec engineers
Screenshot 2025-09-03 at 10
Two new time-efficient Professional Lab scenarios are now live:
Tengu
and
Unintended
.
Both scenarios deliver compact, high-intensity Active Directory challenges designed for penetration testers and red teamers who want realistic practice in modern enterprise environments. With three machines each and layered attack paths, these scenarios take you through a full red-team workflow and put the spotlight on real-world missteps as well as how defenders can spot and stop them.
Here’s what you’ll gain:
  • Practical experience exploiting typical vulnerabilities in Active Directory environments
  • A complete attack chain from initial foothold to Domain Admin
  • Training on common missteps in Active Directory migrations
  • Practice combining Linux privilege escalation with Active Directory attack paths
Screenshot 2025-08-28 at 2
Screenshot 2025-08-28 at 2
Ifrit simulates a real-world Active Directory environment where your goal is to operate under the radar. With 7 flags and 10 machines, this scenario challenges you to evade detection while exploiting AD systems, testing your ability to balance stealth and impact in complex environments.
You’ll gain the skills to:
  • Enumerate and exploit Active Directory networks and services
  • Perform lateral movement across multiple forests
  • Bypass EDR solutions and detection mechanisms
  • Execute relay attacks and covert operations
Screenshot 2025-08-26 at 5
This hands-on, 6-module path takes you from Android fundamentals through static, dynamic, and malware analysis. You’ll develop the knowledge and practical skills needed to identify vulnerabilities, mitigate risks, and perform forensic investigations on Android devices.
By completing the path, you’ll be able to:
  • Understand Android OS architecture, app components, and the mobile security model
  • Detect, analyze, and reverse-engineer malicious Android applications
  • Automate pentesting workflows with tools like MobSF, Frida, Objection, ALEAPP, and Autopsy
  • Recover and interpret data from Android devices using professional forensic techniques
The modules included in the path are:
  • Android Fundamentals
  • Android Application Static Analysis
  • Android Application Dynamic Analysis
  • Android Application Malware Analysis
  • Android Penetration Testing Automation
  • Android Forensics
Android Application Pentesting (1)
The newly released Android Forensics module dives into Android forensics, equipping you with the techniques and tools needed to investigate compromised devices and recover critical data. From uncovering hidden artifacts to reconstructing user activity, you’ll build the expertise required for professional forensic investigations.
By the end of the module, you'll be able to:
  • Set up and operate a secure Android forensic environment
  • Recover and interpret backup files to reconstruct user data, system settings, and device usage patterns
  • Apply rooting techniques and manage root access with tools like SuperSU and Magisk
  • Perform data carving, timeline analysis, and recover deleted files
image
We’ve just released a brand-new curated path designed to get you fully prepared for the Wanderer Professional Lab scenario. This path includes 9 machines and will guide you through essential techniques including:
  • Mobile Exploitation
  • Advanced SQL Injection
  • Filter Evasion
  • Wi-Fi Attacks
  • VoIP Hacking
Beyond scenario prep, this path is also ideal for intermediate red teamers looking to strengthen their enumeration, lateral movement, and attack chain building skills in a realistic, hands-on environment. By the end, you’ll have the well-rounded offensive toolkit needed to navigate Wanderer, and similar complex engagements, with confidence.
Screenshot 2025-08-26 at 12
Two new exclusive releases are now live on Dedicated Labs, covering firewall exploitation, privilege escalation in Linux, and critical PAN-OS vulnerabilities!
SUS | Exclusive Machine
Explore an Easy Linux machine showcasing two privilege escalation CVEs in openSUSE Leap 15.6. Move from unprivileged user to root by abusing PAM configuration and libblockdev through udisks, and learn how misconfigurations can lead to full system compromise.
image (52)
PwnOS | Exclusive Machine
Get hands-on with CVE-2024-9474 in Palo Alto Networks PAN-OS. Exploit a command injection in the management web interface to escalate to root privileges, reinforcing the need to secure and update network security appliances.
image (51)
Step into the shoes of an attacker targeting a Palo Alto Networks PAN-OS firewall in Panos, our newest Exclusive Sherlock. In this scenario, multiple known CVEs are chained together to bypass authentication on the web-based management console and escalate to root-level access.
You’ll trace how the compromise unfolds, uncover the tactics that make firewall exploits so dangerous, and see firsthand why unpatched vulnerabilities on internet-facing systems pose such a critical risk. This Exclusive Sherlock challenges you to think like an adversary while reinforcing the importance of timely patching and proactive monitoring.
image (53)
Load More