Practice Lab
Choose a phase of the ethical hacking lifecycle to focus on. Each section will take you into a dedicated question bank for that topic.
Reconnaissance
Focus on passive and active information gathering to understand the target before touching production systems.
Scanning
Map attack surface, discover live hosts, and identify open ports and services safely and efficiently.
Gaining Access
Turn findings into footholds by exploiting vulnerabilities and misconfigurations within clearly defined rules of engagement.
Maintaining Access
Explore persistence, lateral movement, and staying in control of compromised assets in a controlled way.
Covering Tracks
Understand how attackers attempt to hide activity and why these techniques are sensitive in professional testing.
Ethics & Laws
Ground your technical skills in legal frameworks, professional ethics, and responsible disclosure practices.