
- Test your skills in simulated cyber attacks
- Choose the attack scenario and its level of difficulty
- Go through each task and learn
- Recognize and understand what happens during hacking attacks
What is Hacking Arena?
What is the point of Hacking Arena?
How does the Hacking Arena work?
How do you get into the Hacking Arena?

3 levels
3 rounds
8 scenarios
Try out the role of a real attacker, choose the scenario that best suits you and test your skills when achieving your objectives. We all have different skills and abilities, so you can choose from 3 levels of difficulty for each scenario.
Choose from three difficulty levels

Script Kiddie – You will receive a complete manual with all the information and procedures as well as the tools you can use along with instructions on how to exploit the vulnerabilities.

Normal – You will receive basic help that will guide you to the correct path for the defined vulnerability and a general guide on how to best exploit the security flaw to ensure your attack is a success.

Hardcore – You only receive information about the attack vector and the network device that has the vulnerability, the rest is up to you and your skills.
3 rounds and 8 scenarios
Breaking the Perimeter
In this scenario your job is to carry out an attack on the employees of a fictional company. An attack is understood to be creating malware and the subsequent phishing campaigns.
The scenario focuses on obtaining information about the employees of a fictitious company. You will choose potential targets from them who might be more susceptible to socio-technical attacks. After creating a list of potential targets, it is then necessary to create a credible phishing campaign, i.e. to come up with an enticing email message. This message will contain malware generated by the Covenant tool. When successfully campaigned and executed, it will allow commands to be executed on the victim's station.
In this scenario, your job is to identify and exploit SQL Injection vulnerabilities on the HackingArena web server.
The scenario focuses on web applications and specifically the injection of SQL queries into untreated inputs. In this case the application is simple and it takes a minimum of time to reveal the vulnerability. In this task more emphasis is placed on vulnerability exploitation than on revealing vulnerabilities. First, it is necessary to discover the type and version of the DBMS, i.e., the type and version of the software that is used to manage the data. After discovering this information a job will come up to create a query that allows commands to be run on the vulnerable server.
In this scenario, you must identify and exploit a known vulnerability in an email server to breach HackingArena's perimeter defences.
The first step in this scenario (as in the real world) is the necessary enumeration of the software used. After determining the type and version used, the next step is to look for known vulnerabilities. There are many databases on the Internet containing exploits for vulnerable versions of software. After finding a potential exploit for a vulnerable version of the software we have identified, it is necessary to ascertain what is needed to exploit it, i.e., whether it is possible to exploit the vulnerability unauthenticated or whether it requires valid login data. In the end exploiting a publicly known vulnerability leads to the ability to execute any code remotely. In this scenario, the participant will learn to search for information that is publicly available on the Internet and will be able to use it.
Privilege Escalation
In this scenario, your job is to obtain the highest local permission on one of the user stations.
The scenario’s task is to introduce an attacker to the options for privilege escalation on a regular Windows 10 user station. As always, the first step to success is system enumeration, i.e. what is running on the system, what is the configuration of services, the contents of directories and files. Fortunately, there is no need to do these tasks manually, as it is possible to use existing scripts that automate this process. Carrying out a system enumeration reveals the options for privilege escalation using an incorrectly configured service that the compromised user has the right to access. Once again the Covenant tool is used to exploit this vulnerability.
In this scenario, your job is to obtain the highest permissions on a database server.
The scenario’s task is to familiarize you with the options for privilege escalation on UNIX-like systems. As always, the first step to success is system enumeration, i.e. what is running on the system, what is the configuration of services, the contents of directories and files. Fortunately, there is no need to do these tasks manually, as it is possible to use existing scripts that automate this process. The enumeration will reveal several potential options for privilege escalation. This scenario focuses on exploiting UNIX wildcards, that being by injecting additional parameters into a process that will run under the privileges of the highest privileged root user. The injected parameter will contain commands we have chosen, giving us the right to execute commands as the root user.
In this scenario, your job is to obtain the highest permissions on a database server.
The scenario’s task is to familiarize you with the options for privilege escalation on UNIX-like systems. As always, the first step to success is system enumeration, i.e. what is running on the system, what is the configuration of services, the contents of directories and files. Fortunately, there is no need to do these tasks manually, as it is possible to use existing scripts that automate this process. The enumeration will reveal several potential options for privilege escalation. This scenario focuses on the manual analysis of executable files/scripts that, under certain circumstances, could lead to privilege escalation. The analysis first reveals the script’s functioning in detail and looks for a way, within the user's current permissions, to exploit the incorrectly written script code to subvert and execute your own code and thus gain root privileges.
Getting the Domain
In this scenario, your job is to obtain a domain administrator account by means of a controlled database server.
The compromised server from the previous scenarios is integrated into the Active Directory environment and uses Kerberos authentication. The scenario assumes that the server is compromised (we have root user privileges) and is also integrated into the Windows domain, so it is likely that domain users will log on to it at some time. These users can use the SSH protocol as standard. As a root user, it is possible to use the strace tool to capture system calls to individual applications, including the sshd application that manages users’ SSH connections. Therefore, the task in this scenario is to capture login credentials and thus elevate your privileges to domain admin.
In this scenario, your job is to obtain a domain administrator account by means of a controlled user station.
The compromised station from the previous scenarios is integrated into the Active Directory environment. In Windows, under certain conditions, users who log on to these systems have their password hashes (and sometimes even the passwords themselves) stored in the memory. By compromising the system, we have the highest privileges and can therefore read these hashes from the memory using the publicly known Mimikatz tool. What’s more, in the default setting, Windows systems allow a technique called Pass-the-Hash, where we can log in to the system with just knowing the password hash (it is not necessary to know the original password). In this scenario, your job is to extract the user's hashes from the memory and then use these hashes to compromise other systems using the Pass-the-Hash technique. The goal is to obtain the domain administrator’s hash/password, i.e. compromising the Windows domain.
I would like to enter the Hacking Arena
Voctářova 2500/20a
180 00 Praha 8 Libeň
CRN: 04772148
TIN: CZ04772148
ISDS (data box ID): 9kvkzi9
Personal data is processed so we can offer Aricoma products and services by telephone, e-mail and other communication pathways. This includes contact details and other personal data that we obtain directly from you. Your consent to processing is limited to a period of three years. The personal data controller is exclusively Aricoma Enterprise Cybersecurity a.s., CRN 04772148, Voctářova 2500/20a, 180 00 Praha 8. You have the right to withdraw your consent at any time by informing the company at Aricoma, Voctářova 20a, 180 00 Praha or at the e-mail: gdpr [at] aricoma.com. If you withdraw your consent, your personal data will no longer be processed for the aforementioned purpose and the data collected for this purpose will be destroyed, unless there is another legal reason for processing them. If you suspect that the processing of your personal data violates the current legislation, you have the right to file a complaint with the Office for Personal Data Protection, Pplk. Sochora 27, 170 00 Praha7; www.uoou.cz.