{"id":92,"date":"2024-03-29T07:24:14","date_gmt":"2024-03-29T07:24:14","guid":{"rendered":"https:\/\/cryptrz.org\/wordpress\/?p=92"},"modified":"2025-05-14T05:49:32","modified_gmt":"2025-05-14T03:49:32","slug":"pentestground-free-pentesting-labs","status":"publish","type":"post","link":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/","title":{"rendered":"PentestGround, free pentesting labs"},"content":{"rendered":"\n<p>Preparing a lab for practicing pentest can take time. Depending of the vulnerable and attacker machines, you may need to download a vulnerable virtual machine, install it, fix eventual issues on&nbsp;<strong>VirtualBox<\/strong>&nbsp;or&nbsp;<strong>VMware<\/strong>, start services, maybe prepare the database, tools, proxies, certificates, etc\u2026 A list of these labs is available on&nbsp;<a href=\"https:\/\/owasp.org\/www-project-vulnerable-web-applications-directory\/\">owasp.org<\/a>. They\u2019re fun, useful, some of them are offline, others are online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"tryhackme\">TryHackMe<\/h2>\n\n\n\n<p>A simple alternative to use a few of them is to go to&nbsp;<a href=\"https:\/\/tryhackme.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">TryHackMe<\/a>. You can find for example&nbsp;<a href=\"http:\/\/127.0.0.1:4000\/posts\/pentestground\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP Juice Shop<\/a>,&nbsp;<a href=\"http:\/\/127.0.0.1:4000\/posts\/pentestground\/\" target=\"_blank\" rel=\"noreferrer noopener\">OWASP Mutillidae II<\/a>,&nbsp;<a href=\"http:\/\/127.0.0.1:4000\/posts\/pentestground\/\" target=\"_blank\" rel=\"noreferrer noopener\">DVWA (Damn Vulnerable Web Application)<\/a>. You can execute them anytime, they\u2019re free, but you need to create a&nbsp;<strong>TryHackMe<\/strong>&nbsp;account.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"pentestground-by-pentest-toolscom\">PentestGround by&nbsp;<a href=\"https:\/\/pentest-tools.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">pentest-tools.com<\/a><\/h2>\n\n\n\n<p>If for some reason you don\u2019t want to subscribe&nbsp;<strong>TryHackMe<\/strong>, I\u2019ve just found a nice website with this kind of learning tools for pentesters, without subscription and instantaneously available. This website is&nbsp;<a href=\"https:\/\/pentest-ground.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">PentestGround<\/a>.<\/p>\n\n\n\n<p>You\u2019ll find a list of vulnerable machines with different technologies, web apps, a&nbsp;<strong>Redis<\/strong>&nbsp;server and APIs like&nbsp;<strong>REST API<\/strong>&nbsp;or&nbsp;<strong>GraphQL<\/strong>&nbsp;and their vulnerabilities.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"729\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems-1024x729.png\" alt=\"PentestGround page made by pentest-tools.com showing the list of vulnerable systems available for practicing\" class=\"wp-image-95\" title=\"The list of vulnerable systems available on PentestGround\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems-1024x729.png 1024w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems-300x214.png 300w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems-768x547.png 768w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems.png 1223w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"dvwa\">DVWA<\/h2>\n\n\n\n<p>If you click for example the&nbsp;<a href=\"https:\/\/pentest-ground.com:4280\/\" target=\"_blank\" rel=\"noreferrer noopener\">first link<\/a>&nbsp;for&nbsp;<strong>Damn Vulnerable Web Application<\/strong>, you\u2019re directed to PentestGround\u2019s instance which appears in a second and is ready to use.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"777\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/dvwa-homepage-on-pentestground-1024x777.png\" alt=\"DVWA homepage available on pentest-ground.com\" class=\"wp-image-96\" title=\"DVWA homapge installed by PentestGround\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/dvwa-homepage-on-pentestground-1024x777.png 1024w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/dvwa-homepage-on-pentestground-300x228.png 300w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/dvwa-homepage-on-pentestground-768x583.png 768w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/dvwa-homepage-on-pentestground.png 1219w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"rest-api\">REST API<\/h2>\n\n\n\n<p>You can also test a&nbsp;<strong>REST API<\/strong>&nbsp;by clicking the&nbsp;<a href=\"https:\/\/pentest-ground.com:9000\/\" target=\"_blank\" rel=\"noreferrer noopener\">third link<\/a>. A first page provides some technical detail and URL for this API.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"789\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/rest-api-technical-details-1024x789.png\" alt=\"vulnerable REST API homepage available on pentest-ground.com and showing technical specifications\" class=\"wp-image-97\" title=\"Vulnerable REST API available on PentestGround \" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/rest-api-technical-details-1024x789.png 1024w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/rest-api-technical-details-300x231.png 300w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/rest-api-technical-details-768x592.png 768w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/rest-api-technical-details.png 1221w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>If you click&nbsp;<a>\u201cScan this API\u201d<\/a>&nbsp;bottom page, a quick walkthrough explains how to use&nbsp;<a href=\"https:\/\/app.pentest-tools.com\/website-vulnerability-scanning\/api-scanner\" target=\"_blank\" rel=\"noreferrer noopener\">PentestTools<\/a>&nbsp;for testing the API without virtual machines or local tools and setup an authorization header. If you don\u2019t have any account on this website, just&nbsp;<a href=\"https:\/\/app.pentest-tools.com\/login\" target=\"_blank\" rel=\"noreferrer noopener\">subscribe here<\/a>&nbsp;before testing the API.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"691\" height=\"764\" src=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/steps-for-scanning-the-vulnerable-rest-api.png\" alt=\"Numbered list showing how to scan the vulnerable API and providing the authentication header\" class=\"wp-image-98\" title=\"Steps for scanning the vulnerable REST API\" srcset=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/steps-for-scanning-the-vulnerable-rest-api.png 691w, https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/steps-for-scanning-the-vulnerable-rest-api-271x300.png 271w\" sizes=\"auto, (max-width: 691px) 100vw, 691px\" \/><\/figure>\n\n\n\n<p>If you have your own virtual machines or (pen)testing tools locally installed , you can just launch&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=xDotz4iOVNQ\" target=\"_blank\" rel=\"noreferrer noopener\">Postman and Burp Suite<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"API Pentesting Part 1 | Postman + Burp Suite\" width=\"990\" height=\"557\" src=\"https:\/\/www.youtube.com\/embed\/xDotz4iOVNQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"API Pentesting Part 2 | Postman + Burp Suite\" width=\"990\" height=\"557\" src=\"https:\/\/www.youtube.com\/embed\/vj3CIaURxrc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>You can now explore and hack each of them. Thanks to&nbsp;<a href=\"https:\/\/pentest-tools.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">PentestTools<\/a>&nbsp;for providing these free labs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Preparing a lab for practicing pentest can take time. Depending of the vulnerable and attacker machines, you may need to download a vulnerable virtual machine, install it, fix eventual issues<a href=\"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/\" class=\"more-link\"><span class=\"readmore\">Continue reading<span class=\"screen-reader-text\">PentestGround, free pentesting labs<\/span><\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[18,9],"tags":[23,25,20,21,19,24,15,22],"class_list":["post-92","post","type-post","status-publish","format-standard","hentry","category-practice","category-security","tag-api","tag-graphql","tag-labs","tag-pentest","tag-practice","tag-restapi","tag-tutorial","tag-webapp"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Practice pentesting and ethical hacking for free on PentestGround<\/title>\n<meta name=\"description\" content=\"Preparing a lab for practicing pentest can take time. PentestingLabs provides ready to use pentesting labs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Practice pentesting and ethical hacking for free on PentestGround\" \/>\n<meta property=\"og:description\" content=\"Preparing a lab for practicing pentest can take time. PentestingLabs provides ready to use pentesting labs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/\" \/>\n<meta property=\"og:site_name\" content=\"Cryptrz\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-29T07:24:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-14T03:49:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1223\" \/>\n\t<meta property=\"og:image:height\" content=\"871\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"cryptrz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"cryptrz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/\"},\"author\":{\"name\":\"cryptrz\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#\\\/schema\\\/person\\\/24ebe8f2cc302fa3336ab7509a09b7ec\"},\"headline\":\"PentestGround, free pentesting labs\",\"datePublished\":\"2024-03-29T07:24:14+00:00\",\"dateModified\":\"2025-05-14T03:49:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/\"},\"wordCount\":375,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#\\\/schema\\\/person\\\/24ebe8f2cc302fa3336ab7509a09b7ec\"},\"image\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/pentestground-vulnerable-systems-1024x729.png\",\"keywords\":[\"api\",\"graphql\",\"labs\",\"pentest\",\"practice\",\"restapi\",\"tutorial\",\"webapp\"],\"articleSection\":[\"Practice\",\"Security\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/\",\"url\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/\",\"name\":\"Practice pentesting and ethical hacking for free on PentestGround\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/pentestground-vulnerable-systems-1024x729.png\",\"datePublished\":\"2024-03-29T07:24:14+00:00\",\"dateModified\":\"2025-05-14T03:49:32+00:00\",\"description\":\"Preparing a lab for practicing pentest can take time. PentestingLabs provides ready to use pentesting labs\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/pentestground-vulnerable-systems.png\",\"contentUrl\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/pentestground-vulnerable-systems.png\",\"width\":1223,\"height\":871,\"caption\":\"PentestGround page showing list of vulnerable systems\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/2024\\\/03\\\/29\\\/pentestground-free-pentesting-labs\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PentestGround, free pentesting labs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#website\",\"url\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/\",\"name\":\"Cryptrz\",\"description\":\"Franck Ridel\",\"publisher\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#\\\/schema\\\/person\\\/24ebe8f2cc302fa3336ab7509a09b7ec\"},\"alternateName\":\"Franck Ridel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/#\\\/schema\\\/person\\\/24ebe8f2cc302fa3336ab7509a09b7ec\",\"name\":\"cryptrz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cover-design.jpg\",\"url\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cover-design.jpg\",\"contentUrl\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cover-design.jpg\",\"width\":1024,\"height\":1024,\"caption\":\"cryptrz\"},\"logo\":{\"@id\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/cover-design.jpg\"},\"description\":\"Sysadmin de Luxembourg House of Cybersecurity fan d'open source et autres Unixeries\",\"sameAs\":[\"https:\\\/\\\/cryptrz.org\\\/wordpress\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/franck-ridel\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@FranckRidel\",\"https:\\\/\\\/soundcloud.com\\\/franck-ridel-2\"],\"url\":\"https:\\\/\\\/cryptrz.org\\\/wordpress\\\/author\\\/cryptrz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Practice pentesting and ethical hacking for free on PentestGround","description":"Preparing a lab for practicing pentest can take time. PentestingLabs provides ready to use pentesting labs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/","og_locale":"fr_FR","og_type":"article","og_title":"Practice pentesting and ethical hacking for free on PentestGround","og_description":"Preparing a lab for practicing pentest can take time. PentestingLabs provides ready to use pentesting labs","og_url":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/","og_site_name":"Cryptrz","article_published_time":"2024-03-29T07:24:14+00:00","article_modified_time":"2025-05-14T03:49:32+00:00","og_image":[{"width":1223,"height":871,"url":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems.png","type":"image\/png"}],"author":"cryptrz","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"cryptrz","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/#article","isPartOf":{"@id":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/"},"author":{"name":"cryptrz","@id":"https:\/\/cryptrz.org\/wordpress\/#\/schema\/person\/24ebe8f2cc302fa3336ab7509a09b7ec"},"headline":"PentestGround, free pentesting labs","datePublished":"2024-03-29T07:24:14+00:00","dateModified":"2025-05-14T03:49:32+00:00","mainEntityOfPage":{"@id":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/"},"wordCount":375,"commentCount":0,"publisher":{"@id":"https:\/\/cryptrz.org\/wordpress\/#\/schema\/person\/24ebe8f2cc302fa3336ab7509a09b7ec"},"image":{"@id":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/#primaryimage"},"thumbnailUrl":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems-1024x729.png","keywords":["api","graphql","labs","pentest","practice","restapi","tutorial","webapp"],"articleSection":["Practice","Security"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/","url":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/","name":"Practice pentesting and ethical hacking for free on PentestGround","isPartOf":{"@id":"https:\/\/cryptrz.org\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/#primaryimage"},"image":{"@id":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/#primaryimage"},"thumbnailUrl":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems-1024x729.png","datePublished":"2024-03-29T07:24:14+00:00","dateModified":"2025-05-14T03:49:32+00:00","description":"Preparing a lab for practicing pentest can take time. PentestingLabs provides ready to use pentesting labs","breadcrumb":{"@id":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/#primaryimage","url":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems.png","contentUrl":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/03\/pentestground-vulnerable-systems.png","width":1223,"height":871,"caption":"PentestGround page showing list of vulnerable systems"},{"@type":"BreadcrumbList","@id":"https:\/\/cryptrz.org\/wordpress\/2024\/03\/29\/pentestground-free-pentesting-labs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/cryptrz.org\/wordpress\/"},{"@type":"ListItem","position":2,"name":"PentestGround, free pentesting labs"}]},{"@type":"WebSite","@id":"https:\/\/cryptrz.org\/wordpress\/#website","url":"https:\/\/cryptrz.org\/wordpress\/","name":"Cryptrz","description":"Franck Ridel","publisher":{"@id":"https:\/\/cryptrz.org\/wordpress\/#\/schema\/person\/24ebe8f2cc302fa3336ab7509a09b7ec"},"alternateName":"Franck Ridel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cryptrz.org\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":["Person","Organization"],"@id":"https:\/\/cryptrz.org\/wordpress\/#\/schema\/person\/24ebe8f2cc302fa3336ab7509a09b7ec","name":"cryptrz","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/09\/cover-design.jpg","url":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/09\/cover-design.jpg","contentUrl":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/09\/cover-design.jpg","width":1024,"height":1024,"caption":"cryptrz"},"logo":{"@id":"https:\/\/cryptrz.org\/wordpress\/wp-content\/uploads\/2024\/09\/cover-design.jpg"},"description":"Sysadmin de Luxembourg House of Cybersecurity fan d'open source et autres Unixeries","sameAs":["https:\/\/cryptrz.org\/wordpress","https:\/\/www.linkedin.com\/in\/franck-ridel\/","https:\/\/www.youtube.com\/@FranckRidel","https:\/\/soundcloud.com\/franck-ridel-2"],"url":"https:\/\/cryptrz.org\/wordpress\/author\/cryptrz\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/posts\/92","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/comments?post=92"}],"version-history":[{"count":10,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/posts\/92\/revisions"}],"predecessor-version":[{"id":5825,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/posts\/92\/revisions\/5825"}],"wp:attachment":[{"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/media?parent=92"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/categories?post=92"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cryptrz.org\/wordpress\/wp-json\/wp\/v2\/tags?post=92"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}