Learn essential Linux commands through hands-on challenges.
Complete each level to unlock the next.
Investigate a security breach on a Linux server. Navigate the filesystem, read log files, create directories for your investigation, and manage evidence files.
Analyze a suspect's workstation for hidden files and encrypted communications. Use advanced ls flags, identify disguised files, and decrypt secret messages.
A production server has been compromised. Identify running processes, search for malicious activity, and terminate rogue processes before they cause more damage.
An APT group has compromised the web server. Conduct a full investigation: map the attack, analyze evidence, identify all threats, and remediate the system. No hints provided.
Harden a compromised system by fixing file permissions and ownership. Set up audit logging with output redirection and secure sensitive configurations.
Analyze log files to understand a security incident. Extract, filter, and process text data to identify attack patterns and generate forensic reports.
Manage a server migration with proper backup procedures. Create and extract archives, monitor disk usage, and configure your environment for system administration tasks.
The final test of your Linux skills. A sophisticated attack requires you to use everything you've learned: navigation, analysis, processes, permissions, archiving, and more.