Three (3) new exclusive Machines just landed in Dedicated Labs, focusing on phishing, Cloud, and CVE exploitation.
GoneFishing
Learn how phishing attacks work by sending malicious emails to gain a foothold, followed by escalating privileges through abusing a scheduled task.
Deputy
Explore a Confused Deputy attack in a simulated AWS cloud environment, with root access achieved by abusing Terraform state files exposed via sudo permissions.
SweetCRM
Understand critical vulnerability exploitation in SuiteCRM 7.12.1, demonstrating arbitrary code execution and gaining shell access using default credentials.
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
image