Room progress ( NaN% )
Task 1Introduction
Task includes a deployable machine
Task 2Reverse Shells
Task 3Privilege Escalation
Task 4Startup Persistence
Task 5Account Persistence
Task 6Targeted Attacks and Recap
Task 7Conclusion
Ready to learn Cyber Security? Create your free account today!
The Linux Threat Detection 3 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in