Skip to content

RedAmon HackLab

“samuele edited this page Mar 30, 2026 · 1 revision

RedAmon HackLab

RedAmon HackLab

45 agentic attack prompts. One target. Zero hand-holding.

The HackLab is a curated set of attack scenarios designed to showcase RedAmon's AI agent autonomously discovering, chaining, and exploiting vulnerabilities -- just like a real pentester.

All sessions are performed on a deliberately vulnerable application (DVWS-Node) deployed on our own controlled server for educational and research purposes only. Never use these techniques on systems you do not own or have explicit written authorization to test. Unauthorized access is illegal.


How It Works

Each prompt points the agent at a specific port and service, then lets it figure out the rest: endpoint discovery, vulnerability identification, exploitation, and post-exploitation. The agent queries the recon graph for context, selects its own tools, and adapts when things don't go as expected.

The target is a deliberately vulnerable environment deployed on EC2:

  • DVWS-Node (Damn Vulnerable Web Services) -- a Node.js app with 15+ vulnerability categories
  • CVE Lab -- real-world CVE-vulnerable services (Tomcat, vsftpd, Spring Boot)

Prerequisites

  1. DVWS-Node + CVE Lab deployed on your EC2 instance
  2. Full recon pipeline executed and stored in the graph database
  3. RedAmon agent configured with the target project

Target Service Map

Port Service What Lives There
80 Express/Node.js REST API, SOAP, Swagger -- all app-level vulns
4000 Apollo GraphQL Introspection, IDOR, SQLi, file write
3306 MySQL 8.4.8 Direct DB access (exposed, no firewall)
21 vsftpd 2.3.4 CVE-2011-2523 backdoor
8080 Tomcat 8.5.19 CVE-2017-12617 PUT RCE, Ghostcat
8888 Spring Boot Log4Shell (CVE-2021-44228)
9090 XML-RPC SSRF via method calls

The full target overview, recon data, and all prompts are in REDAMON.HACKLAB.md.


Attack Sessions

Each session contains:

  • XXX-XXXXX_session.md -- the raw unedited agent session log (every tool call, response, and reasoning step)
  • XXX-XXXXX_sess_decoded.md -- a human-readable walkthrough explaining the full attack chain, key decisions, and what capabilities the agent demonstrated

MISLEADING INTEL (MSL)

Prompts that intentionally give the agent wrong assumptions. The agent must recognize the mismatch, pivot, and still achieve the objective.

Code Title Status Time Steps Score Model Video Session
MSL-XAJI0 Wrong Database Assumption DONE 12m 21s 14 72 Opus 4.6 YouTube decoded / raw
MSL-Y6DPB Wrong Port for the Vulnerability -- -- -- -- -- -- --
MSL-HSAHX Wrong Protocol Assumption -- -- -- -- -- -- --
MSL-THV3A Wrong Technology Stack -- -- -- -- -- -- --

SQL INJECTION (SQL)

Code Title Status Time Steps Score Model Video Session
SQL-3ZMF8 SQL Injection via POST Parameters -- -- -- -- -- -- --
SQL-MDD4V GraphQL SQL Injection -- -- -- -- -- -- --
SQL-30T9N Blind SQL Injection with Time-Based Extraction -- -- -- -- -- -- --

NoSQL INJECTION (NQL)

Code Title Status Time Steps Score Model Video Session
NQL-T3W5U NoSQL Injection via MongoDB Search Endpoints -- -- -- -- -- -- --
NQL-ZBIKC NoSQL Operator Injection for Authentication Bypass -- -- -- -- -- -- --

OS COMMAND INJECTION & RCE (RCE)

Code Title Status Time Steps Score Model Video Session
RCE-IDKWN Command Injection Discovery and Reverse Shell -- -- -- -- -- -- --
RCE-NHJ7X Insecure Deserialization (node-serialize) RCE -- -- -- -- -- -- --
RCE-VG0FN Command Injection to Credential Harvesting -- -- -- -- -- -- --
RCE-9XUY4 Chained RCE: JWT Bypass + CMDi + Persistence -- -- -- -- -- -- --

XXE INJECTION (XXE)

Code Title Status Time Steps Score Model Video Session
XXE-1IBLJ XXE via XML Import for File Exfiltration DONE 9m 14 85 Opus 4.6 YouTube decoded / raw
XXE-O6QJI Blind XXE with Out-of-Band Data Exfiltration -- -- -- -- -- -- --
XXE-UJV6O XML Bomb (Billion Laughs) DoS -- -- -- -- -- -- --

SSRF (SRF)

Code Title Status Time Steps Score Model Video Session
SRF-H9SDB SSRF via Download Endpoint and XML-RPC -- -- -- -- -- -- --
SRF-DW2PC SSRF with file:// Protocol for Local File Read -- -- -- -- -- -- --

JWT & AUTHENTICATION (JWT)

Code Title Status Time Steps Score Model Video Session
JWT-N9T84 JWT Algorithm None Attack for Admin Access -- -- -- -- -- -- --
JWT-AZYTJ JWT Secret Extraction and Token Forgery -- -- -- -- -- -- --
JWT-XEPQ8 Brute Force Login with Rate Limit Bypass -- -- -- -- -- -- --
JWT-5JSG6 Session Analysis: Token Reuse and Expiration Bypass -- -- -- -- -- -- --

IDOR & BROKEN ACCESS CONTROL (IDR)

Code Title Status Time Steps Score Model Video Session
IDR-5KXVF IDOR on Notes API -- -- -- -- -- -- --
IDR-1T2TA GraphQL IDOR for User Enumeration -- -- -- -- -- -- --
IDR-LA753 Privilege Escalation via Mass Assignment -- -- -- -- -- -- --
IDR-LC58D Forced Browsing and Hidden Endpoint Discovery -- -- -- -- -- -- --

XPath INJECTION (XPT)

Code Title Status Time Steps Score Model Video Session
XPT-RC11E XPath Injection for Config Data Extraction -- -- -- -- -- -- --

FILE OPERATIONS & PATH TRAVERSAL (FIL)

Code Title Status Time Steps Score Model Video Session
FIL-RTJ5P Unrestricted File Upload to Web Shell -- -- -- -- -- -- --
FIL-HT0HL Path Traversal for Source Code Theft -- -- -- -- -- -- --
FIL-9XPSE GraphQL Arbitrary File Write to RCE -- -- -- -- -- -- --

PROTOTYPE POLLUTION (PPL)

Code Title Status Time Steps Score Model Video Session
PPL-IMVIH Prototype Pollution via File Upload Metadata -- -- -- -- -- -- --
PPL-CWI64 Prototype Pollution to DoS and Auth Bypass -- -- -- -- -- -- --

INFORMATION DISCLOSURE & RECON (INF)

Code Title Status Time Steps Score Model Video Session
INF-CIYHE Env Variable Leak to JWT Secret to Token Forgery -- -- -- -- -- -- --
INF-7UR23 GraphQL Introspection for Full API Mapping -- -- -- -- -- -- --
INF-GDPPQ OpenAPI/Swagger Discovery and Attack Surface Mapping -- -- -- -- -- -- --

CORS, REDIRECTS & CLIENT-SIDE (CLS)

Code Title Status Time Steps Score Model Video Session
CLS-0Y9DO CORS Misconfiguration Analysis -- -- -- -- -- -- --
CLS-M5IGQ Open Redirect to Phishing Chain -- -- -- -- -- -- --
CLS-PKI7P Log Injection for Forensic Evasion -- -- -- -- -- -- --

CVE EXPLOITATION (CVE)

Code Title Status Time Steps Score Model Video Session
CVE-5TB94 CVE-2011-2523: vsftpd Backdoor to Root Shell -- -- -- -- -- -- --
CVE-874FR CVE-2017-12617: Tomcat PUT RCE to JSP Shell -- -- -- -- -- -- --
CVE-HOCN9 CVE-2020-1938: Tomcat Ghostcat AJP File Read -- -- -- -- -- -- --
CVE-J2QP8 CVE Scan then Exploitation -- -- -- -- -- -- --

FULL ATTACK CHAINS (CHN)

Code Title Status Time Steps Score Model Video Session
CHN-9UZFK Info Disclosure > JWT Forge > SQLi > CMDi -- -- -- -- -- -- --
CHN-8UT0C Multi-Protocol: REST + GraphQL + SOAP -- -- -- -- -- -- --
CHN-VS4F8 App Vulns + CVE Exploitation Combined -- -- -- -- -- -- --
CHN-CGVYI Exposed MySQL: Direct Database Exploitation -- -- -- -- -- -- --

FULL AUTONOMOUS KILL CHAIN (AUT)

Code Title Status Time Steps Score Model Video Session
AUT-E6IVW Agent Self-Designs the Full Attack -- -- -- -- -- -- --

Community Sessions

Share your own RedAmon agent sessions from your real targets and environments. These are not from the HackLab prompt list -- they are real-world pentests, CTFs, or custom lab setups where the agent was used autonomously.

How to Submit

  1. Run the RedAmon agent against your own target (your lab, CTF, authorized pentest)
  2. Export the session log (saved automatically as .md)
  3. Open a PR on the redamon repo:
    • Add your session file to redamon.wiki/hacklab/community/
    • Name it descriptively: your-target_vuln-type_session.md
    • Include a brief summary in the PR description

What to Include in Your PR

## Community Session

**Target:** Brief description (e.g. "HackTheBox - Keeper", "My company's staging API", "Custom CTF lab")
**AI Model:** claude-opus-4-6 / claude-sonnet-4-6 / other
**Attack type:** What the agent was asked to do
**Outcome:** What it achieved
**Total time:** Xm
**Interesting because:** Why this session is worth sharing (unexpected pivot, creative chain, edge case, etc.)
**YouTube:** https://youtu.be/your-video-id

Guidelines

  • Authorized targets only -- do not submit sessions from unauthorized testing
  • Redact sensitive data -- remove real IPs, domains, credentials, or client info before submitting
  • YouTube video required -- record your screen while the agent runs and upload to YouTube
  • Failed sessions welcome -- if the agent got stuck or took a wrong path, that's valuable feedback
  • Different models encouraged -- comparing opus vs sonnet on the same target helps everyone

Clone this wiki locally