Learn essential Linux commands through hands-on challenges.
Complete each level to unlock the next.
Investigate a security breach on a Linux server. Navigate the filesystem, read log files, create directories for your investigation, and manage evidence files.
Analyze a suspect's workstation for hidden files and encrypted communications. Use advanced ls flags, identify disguised files, and decrypt secret messages.
A production server has been compromised. Identify running processes, search for malicious activity, and terminate rogue processes before they cause more damage.
An APT group has compromised the web server. Conduct a full investigation: map the attack, analyze evidence, identify all threats, and remediate the system. No hints provided.