« If you are looking for a passive read about hacking, pass your way. This is a hands-on program to train and hack real systems with real flaws»You get dedicated access to machines with common vulnerabilities. The kind you may find in any corporate environment. Your job is to exploit these flaws and hack your way to the company's business documents.
Hacker playbookYou get to learn and perform the following hacking techniques:
- Bypassing network security
- Attacking middleware programs
- Kerberoasting
- Windows privilege escalation
Ethical hackingI was pleasantly surprised to see people taking up the first edition of the "Ultimate Hacking Challenge", two even three times in a row. Some even used it to pass the OSCP certification. That's the spirit!
I modeled the challenge based on the scenario described in "How to Hack Like a Pornstar" and a few tips from the "Art of Exploitation". This your chance to take action and fully internalize the concepts and reflexes that make a great hacker.