Explore Hacktivities

Discover and join cybersecurity labs, challenges, and training exercises

New to CyberTask? Start Here!
Learn how to connect to machines, submit answers, and navigate the platform in minutes
Start Tutorial
60 labs

Featured Labs

View All Featured

All Labs

Linux System Administration

Linux System Administration

Easy New

Dive into the administrative core of Linux — the layer where the most consequential security decisions happen. This lab covers the full lifecycle of user accounts and group privileges, authentication log analysis, process inspection and control, service hardening with systemd, and scheduled task aud...

17 tasks 1h 14
Linux Networking for Cybersecurity

Linux Networking for Cybersecurity

Easy New

Extend your Linux terminal skills into the networking domain — a critical layer in both offensive and defensive security operations. This lab covers how to inspect network interfaces and routing tables, trace packet paths, perform DNS analysis, monitor live connections and captured traffic, and esta...

15 tasks 1h 162
Linux Terminal Skills

Linux Terminal Skills

Easy New

Building on foundational Linux knowledge, this lab takes your terminal skills to the next level with focused, security-driven practice across five core areas: advanced file and directory management, permissions and ownership, pipes and redirection, searching and text processing, and composing multi-...

19 tasks 1h 9
Linux Fundamentals for Cybersecurity

Linux Fundamentals for Cybersecurity

Easy New

Gain the essential Linux skills that underpin nearly every role in cybersecurity — from SOC analysis and incident response to penetration testing and digital forensics. This lab walks you through the Linux filesystem, terminal navigation, file operations, log analysis, network inspection, and permis...

29 tasks 1h 8
Exploring the MITRE ATT&CK Framework

Exploring the MITRE ATT&CK Framework

Easy New

Get familiar with one of the most widely referenced frameworks in the cybersecurity industry. This lab walks you through the core concepts behind the MITRE ATT&CK framework — from understanding the structure of tactics and techniques to exploring how organizations use it to map their defensive cover...

21 tasks 1h 3
Nmap Network Scanning Fundamentals

Nmap Network Scanning Fundamentals

Easy New

This lab provides comprehensive hands-on training in Nmap, the industry-standard network scanning tool. You will learn to discover live hosts, identify open ports and services, detect operating systems, and leverage advanced scanning techniques. By the end, you will be able to conduct professional-g...

19 tasks 1h 19
PowerShell for Security

PowerShell for Security

Easy New

This lab introduces PowerShell from a security analyst's perspective, covering how commands are structured, how to chain them together using the pipeline, and how to save and run scripts. You'll also explore execution policy — what it means, how to audit it, and why its configuration matters during...

21 tasks 1h 4
Logs Fundamentals: Getting Start With Cybersecurity

Logs Fundamentals: Getting Start With Cybersecurity

Easy New

Logs are the backbone of every security investigation — and knowing how to read them is an essential skill for any blue team role. This beginner-friendly lab walks you through the core concepts of log analysis, from understanding log structure and severity levels to locating event records across Lin...

20 tasks 1h 8
Wireshark Analysis Fundamentals

Wireshark Analysis Fundamentals

Easy New

This tutorial introduces the essential skills needed to navigate and interpret network traffic captures. You'll explore how to examine protocol structures, apply display filters, and use built-in statistics views to understand what's happening across a network. Covering ICMP, TCP, HTTP, and TLS traf...

23 tasks 1h 4
Windows Event Log Fundamentals

Windows Event Log Fundamentals

Easy New

Windows Event Logs are among the most valuable sources of evidence available to security analysts — yet many practitioners don't know how to use them effectively. This beginner-friendly lab walks you through the structure of Windows logging, the significance of key security event categories, and how...

8 tasks 1h 7
Network Traffic Investigation

Network Traffic Investigation

Easy New

Resolving real-world alerting gaps by diving deep into live network traffic. Across three interconnected investigations, you'll expose a rogue Active Directory network harboring malware, trace an actively infected Windows host communicating with an external command-and-control server, and gather evi...

14 tasks 1h 4
Encrypted Traffic Malware Investigation

Encrypted Traffic Malware Investigation

Easy New

Step into a real-world incident response scenario at a financial institution where anomalous outbound connections have triggered security alerts. This investigation challenges you to decrypt encrypted network traffic, identify malicious file downloads, and trace command-and-control communications li...

12 tasks 1h 1
PowerShell for Digital Forensics

PowerShell for Digital Forensics

Easy New

Discover how to leverage native Windows capabilities for effective digital forensics and incident response. This hands-on lab introduces you to powerful scripting techniques for collecting system artifacts, analyzing user activity, and extracting critical evidence from Windows environments. You'll b...

17 tasks 1h 6
WannaCry Ransomware Investigation

WannaCry Ransomware Investigation

Easy

Analyze a real-world ransomware incident by examining volatile memory artifacts from an infected system. In this investigation, you'll uncover malicious processes, trace encryption activity, identify persistence mechanisms, and reconstruct the complete attack timeline. Through hands-on RAM analysis,...

16 tasks 1h 11
Windows Memory Forensics

Windows Memory Forensics

Easy

Investigate compromised Windows systems by analyzing volatile memory dumps to recover evidence that disappears when systems power down. This hands-on lab teaches you to extract running processes, active network connections, credential information, and command history from RAM snapshots. You'll uncov...

11 tasks 1h 6
Email Security Fundamentals

Email Security Fundamentals

Easy

Explore the essential techniques for recognizing fraudulent emails in this foundational exercise. You'll examine email headers, understand authentication protocols like SPF, DKIM, and DMARC, and learn how attackers craft deceptive messages. By analyzing a real-world example, you'll develop practical...

17 tasks 1h 7
SSH Authentication Threat Hunting

SSH Authentication Threat Hunting

Easy

Dive into security operations by investigating SSH authentication activity within a corporate network environment. This lab guides you through analyzing authentication logs to uncover failed login patterns, identify brute-force attempts, detect reconnaissance behavior, and correlate indicators of po...

17 tasks 1h 4
HTTP Traffic Threat Hunting

HTTP Traffic Threat Hunting

Easy

Analyzing web server traffic to identify potential threats and suspicious activities. Through this investigation, you'll master the art of querying enterprise log data, detecting attack patterns through user behavior analysis, identifying server misconfigurations, and uncovering indicators of data e...

17 tasks 1h 4
Hidden Malware Memory Hunt

Hidden Malware Memory Hunt

Easy

Investigate a compromised workstation by analyzing its volatile memory to uncover what traditional forensics might miss. This hands-on tutorial guides you through analyzing volatile memory to uncover hidden malicious processes, extract suspicious artifacts, and decode obfuscated data that adversarie...

10 tasks 1h 4
 Memory Forensics Investigation

Memory Forensics Investigation

Easy

Step into the role of a digital investigator tasked with recovering vital information from a compromised system's volatile memory. This hands-on tutorial teaches you how to identify system profiles, enumerate running processes, and extract hidden artifacts including encrypted databases, browser acti...

11 tasks 1h 3
Network Forensics & Evidence Recovery

Network Forensics & Evidence Recovery

Easy

A digital forensics analyst responding to a potential insider threat incident. This hands-on investigation teaches you how to examine captured network communications to uncover what a suspicious user accessed, downloaded, and attempted to hide.

9 tasks 1h 0
Multi-Source Attack Investigation

Multi-Source Attack Investigation

Easy

Step into the role of a security consultant investigating a real-world data breach scenario. This tutorial challenges you to correlate evidence across network traffic captures, authentication records, intrusion detection alerts, and system logs to build a complete attack timeline.

11 tasks 1h 6
APT Threat Detection & SIEM Analysis

APT Threat Detection & SIEM Analysis

Medium

Act as security analyst investigating a multi-stage cyber attack on a Windows workstation. This hands-on tutorial guides you through analyzing 31 distinct malicious activities—from initial compromise to persistence establishment—teaching you how to write effective detection queries, correlate attack...

47 tasks 1h 19
Zeus Banking Trojan - Memory Forensics with Volatility

Zeus Banking Trojan - Memory Forensics with Volatility

Easy

Learn the art of memory forensics by investigating a real Zeus banking trojan infection. This comprehensive investigation teaches you to analyze memory dumps, detect process injection, trace network connections, and uncover sophisticated evasion techniques. You'll develop critical skills in malware...

18 tasks 1h 5
Loading...