
Online Virtual Machines and Playgrounds
LabEx provides a wide range of online virtual machines and playgrounds for various technologies, allowing you to learn and practice hands-on in a pre-configured environment.
Linux

Online Linux Terminal and Playground
LabEx provides an Online Linux Terminal and Playground, an online environment that allows you to quickly set up a Linux Terminal or Desktop environment.
Linux

Online Ubuntu Desktop & Terminal Playground
LabEx provides an Online Ubuntu Playground, a comprehensive environment that allows you to quickly set up a full Ubuntu Desktop or a Linux Terminal for learning and experimentation.
Linux

Online Shell Terminal and Playground
LabEx provides an Online Shell Terminal and Playground, an online environment that allows you to quickly set up a Shell Terminal or Desktop environment.
Linux

Online Hydra Playground
LabEx provides an Online Hydra Playground, an online environment that allows you to quickly set up a Hydra testing environment for password cracking and brute-force testing.
Linux

Online Debian Playground & Environment
LabEx provides an Online Debian Playground & Environment, an online environment that allows you to quickly set up a Debian Terminal or Desktop environment.
Linux

Online Fedora Playground & Environment
LabEx provides an Online Fedora Terminal and Playground, an online environment that allows you to quickly set up a Fedora Terminal or Desktop environment.
Linux

Online CentOS Playground & Environment
LabEx provides an Online CentOS Playground & Environment, an online environment that allows you to quickly set up a CentOS Terminal or Desktop environment.
Linux

Metasploit Basic Post-Exploitation
In this lab, you will learn the basic post-exploitation techniques in Metasploit, including interacting with sessions, running shell commands, and transferring files.
Linux

Metasploit Simple Exploit Execution
In this lab, you will learn the basic workflow of exploiting a vulnerable service using the Metasploit Framework. You will target a known backdoor in VSFTPD 2.3.4 to gain a shell on the target system.
Linux

SSH Enumeration and Key-Based Access
In this lab, you will learn to enumerate an SSH service using `nmap`, exploit a weak key-based authentication misconfiguration to gain shell access, and retrieve a flag. This exercise focuses on SSH security best practices.
Linux

HTTP Enumeration and Directory Traversal
In this lab, you will learn to perform HTTP service enumeration and exploit a directory traversal vulnerability. You'll use `nmap` to identify a web server, then use `curl` to read a restricted file outside the web root and capture the flag.
Linux

User Account Creation
In this lab, you will learn the fundamental Linux commands for user account management, including creating, modifying, and deleting user accounts, and granting administrative privileges.
Linux

Rsync Enumeration and Anonymous Sync
In this lab, you will learn to enumerate and exploit a misconfigured Rsync service. You'll use `nmap` to detect the service, connect anonymously to sync files from a remote target, and retrieve a flag, highlighting risks in backup synchronization services.
Linux

SMB Enumeration and Guest Access
In this lab, you will learn to perform Server Message Block (SMB) enumeration. You'll use `nmap` to identify the SMB service, exploit a guest access misconfiguration with `smbclient`, and retrieve a flag from a shared directory, simulating a common network vulnerability.
Linux

RDP Enumeration and Weak Password Access
In this lab, you'll enumerate Remote Desktop Protocol (RDP) services, identify vulnerabilities, and gain access using weak credentials. Use `nmap` for scanning, `xfreerdp` for connection, and retrieve a flag from the remote desktop session.
Linux

DAY 09: The Backup Sentinel
In this challenge, you'll act as a system administrator to master Linux backup and recovery, protecting critical data using `tar` and `cron`.
Linux

Telnet Brute Force and Weak Credentials
In this lab, you'll enumerate weak credentials for a Telnet service using a wordlist. You will scan with nmap, use hydra for a brute-force attack, and gain access to a target system to retrieve a flag, highlighting the risks of weak passwords.
Linux