ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
PWK V3 LIST: Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam.Please do not request edit access; File -> Make a copy
2
Curated by Tj Null
3
Blog: www.netsecfocus.com
4
5
Hackthebox:
6
Linux Boxes:Windows Boxes:Windows Active Directory Boxes:Post OSCP Section. Challenging yourself:ProLabs:
7
BusquedaEscapeActive Mentor [Linux]Dante
8
UpDownServmonForestAbsolute [Windows]RastaLabs
9
SauSupportSaunaOutdated [Windows]Post OSCP ProLabs:
10
HelpStreamIOMonteverde Atom [Windows]Zephyr
11
BrokerBlackfieldTimelapseAPT [Windows]Alchemy
12
Intentions IntelligenceReturnAero [Windows]
13
SoccerJeevesCascadeCerberus [Windows/Linux]
14
KeeperManagerFlightMultimaster [Windows]
15
MonitoredAccessBlackfieldCereal [Linux]
16
BoardLightAeroCicadaQuick [Linux]
17
NetworkedMailingEscapeAuthority [Windows]
18
CozyHostingAdministratorAdagio (HTB Enterprise Box)Clicker [Linux]
19
EditorialCertifiedTheFrizzRebound [Windows]
20
MagicMailing [Windows]
21
PandoraVintage [Windows]
22
Builder
23
LinkVortex
24
Dog
25
Markup
26
Usage
27
28
29
30
31
Proving Grounds Practice:
32
Linux Boxes:Windows Boxes:Windows Active Directory Boxes:Post OSCP Section. Challenging yourself:
33
TwiggyHelpdeskAccessNagoya [Windows]
34
ExfiltratedAlgernonHeistOsaka [Windows]
35
PelicanAuthbyVaultProStore [Linux]
36
AstronautCraftNagoyaRPC1 [Linux]
37
BlackgateHutchHokkaido (Retired for now)Symbolic [Windows]
38
BooleanInternalResourcedUpsploit [Linux]
39
ClueJackoHutchValidator [Linux]
40
CockpitKevinGLPI [Linux]
41
CodoResourcedMarshalled [Linux]
42
CraneSquidEducated [Linux]
43
LevramDVR4Kyoto [Windows Buffer Overflow]
44
ExtplorerHepetNara [Windows Active Directory]
45
HubShenzi
46
ImageNickel
47
lawSlort
48
LavitaMedJed
49
PC
50
Fired
51
Press
52
Scrutiny
53
RubyDome
54
Zipper
55
Flu
56
Ochima
57
PyLoader
58
Plum
59
SPX
60
Jordak
61
BitForge
62
Vmdak
63
64
65
Proving Grounds Play:
66
Linux Boxes:Post OSCP Section. Challenging yourself:
67
eLection
68
Stapler
69
Monitoring
70
InsanityHosting
71
DriftingBlue6
72
Loly
73
Blogger
74
Amaterasu
75
Blogger
76
Potato
77
DC-9
78
79
80
81
82
83
84
85
86
87
Vulnlab:
Note: As of April 2nd 2025 Vulnlab will be migrated into HackTheBox:https://www.hackthebox.com/blog/htb-enhances-its-portfolio-with-the-addition-of-vulnlab-content
88
Linux Boxes:Windows Boxes:Windows Active Directory Boxes:Post OSCP Section. Challenging yourself:
89
DataMediaBabyRace [Linux]
90
FeedbackJobBaby2Kaiju [Chain]
91
SyncJob2BreachPush [Chain]
92
ForgottenLockSweepIntercept [Chain]
93
BuildEscapeSendaiZero
94
DumpBrunoPhantom
95
96
Hybrid (Chain)
97
Trusted(Chain)
98
Lustrous (Chain)
99
Reflection(Chain)
100