Our exercises are based on common vulnerabilities found in different systems. The issues are not emulated. We provide you real systems with real vulnerabilities.
Download the ISO and the PDF. Boot the ISO using any virtualisation software and start learning!
The number of ★ under the exercise indicates its difficulty.