![](https://slashparity.com/wp-content/uploads/2023/04/2023-04-17_20-58-1024x585.png)
GCP Pentesting Guide & Notes
t-Pot : The All In One Multi Honeypot Plattform
Cowrie SSH
Exploitation attempt – Crypto miner uncovered
Brute It : Learn how to brute, hash cracking and escalate privileges in this box!
Planning and Scoping : Engagements
![](https://slashparity.com/wp-content/uploads/2021/11/aHViPTcyNTE0JmNtZD1pdGVtZWRpdG9yaW1hZ2UmZmlsZW5hbWU9aXRlbWVkaXRvcmltYWdlXzVkY2Q0OWViYzNjYmYucG5nJnZlcnNpb249MDAwMCZzaWc9NzRjMDIzMjE1OGYzZWY2ZjA2YWM5YjA5YzliZDZjZmI.png)
Common Vulnerability Scoring System CVSS
Are you able to use open source intelligence to solve this challenge?
![](https://slashparity.com/wp-content/uploads/2021/09/shells2.jpg)
![](https://slashparity.com/wp-content/uploads/2021/09/netcat.jpg)
Netcat : TCP/IP swiss army knife