Step-by-step walkthroughs from reconnaissance to root flag. 15 machines covering CVE exploitation, privilege escalation, Active Directory attacks, and more.