How to Use CyberTask Labs: Complete Beginner's Guide
TL;DR
CyberTask provides everything you need to start hacking — virtual machines, Kali Linux, Windows targets, and browser-based access. Just click Run, wait 2-5 minutes for machines to boot, and start learning. No local setup required.
What You’ll Learn
- How to start a lab environment
- How to access Windows and Kali Linux machines
- How to submit answers and flags
- How to use the network topology view
- Tips for Firefox users and troubleshooting
Prerequisites
- A CyberTask account (create one here)
- A modern web browser (Chrome, Firefox, Edge, or Safari)
- That’s it! No VMs, no VPN, no local tools needed
Step 1: Understanding the Lab Interface
When you open any lab on CyberTask, you’ll see three main panels:
| Panel | Purpose |
|---|---|
| Machine | Access virtual machines directly in your browser |
| Browser | Built-in web browser for testing web applications |
| Network | Visual topology showing all machines in the lab |
The lab interface is designed to give you a complete hacking environment without leaving your browser.
Step 2: Starting the Lab Network
Every lab includes a network of virtual machines ready for you to use.
How to start:
- Click the “Run” button at the top right corner of your screen
- Wait 2-5 minutes for machines to initialize
- The progress indicator will show when machines are ready
- Once ready, you can access any machine in the network
Step 3: Accessing Your Attack Machine (Kali Linux)
CyberTask provides a fully configured Kali Linux machine as your attack platform.
What’s included:
- Pre-installed hacking tools (Nmap, Burp Suite, Metasploit, etc.)
- Full terminal access
- GUI desktop environment
- Network connectivity to target machines
To access Kali Linux:
- Go to the Machine tab
- Select the Kali Linux machine from the list
- Click to connect — it opens directly in your browser
- Start using terminal or GUI tools immediately
Step 4: Accessing Target Machines (Windows/Linux)
Labs include various target machines depending on the challenge:
| Machine Type | Common Uses |
|---|---|
| Windows Server | Active Directory, privilege escalation |
| Windows Desktop | Client-side attacks, malware analysis |
| Linux Servers | Web apps, privilege escalation, CTF challenges |
| Network Devices | Router/firewall configuration challenges |
To access target machines:
- Go to the Machine tab
- Select the target machine you want to access
- Connect via browser-based RDP, SSH, or VNC
- Credentials are provided in the lab description when needed
Step 5: Using the Network Topology View
The Network tab shows a visual map of all machines in the lab.
Why it’s useful:
- See how machines are connected
- Understand network segments and subnets
- Plan your attack path
- Identify target IPs quickly
This is especially helpful for complex labs with multiple machines and network segments.
Step 6: Submitting Answers and Flags
As you complete tasks, you’ll need to submit answers or capture flags.
Answer format rules:
| Rule | Example |
|---|---|
| Case insensitive | Friday, friday, FRIDAY all work |
| Order doesn’t matter | If answer is 80, 443, 8080, then 443, 8080, 80 is accepted |
| Flag format | Usually CTF{...} or as specified in the challenge |
To submit:
- Find the answer/flag on the target system
- Enter it in the submission field for that task
- Click submit — instant feedback on correctness
- Move to the next task
Step 7: Downloading Attachments
Some labs include files you’ll need for the challenge:
- Exploit scripts
- Wordlists
- Configuration files
- Evidence files for forensics
To download:
- Look for the attachment icon next to tasks
- Click to download directly to your attack machine
- Files are also accessible from your browser
Tips for Firefox Users
How to enable copy/paste:
- Type
about:configin Firefox’s URL bar - Accept the warning and continue
- Search for
asyncClipboard - Set all listed items to
true - Refresh the CyberTask page
This allows you to copy/paste between your local machine and the virtual machines.
Troubleshooting
Machine won’t start?
- Wait the full 2-5 minutes for boot
- Try clicking “Run” again
- Check your internet connection
- Contact support if issues persist
Can’t connect to machine?
- Ensure the machine status shows “Running”
- Try refreshing the browser
- Clear browser cache and cookies
- Try a different browser
Copy/paste not working?
- Firefox: Follow the asyncClipboard instructions above
- Chrome/Edge: Should work by default
- Try using the on-screen keyboard if available
Need help during a lab?
- Use the Support button in the lab interface
- Check the lab’s hints if available
- Ask in the CyberTask community
What Makes CyberTask Different?
| Feature | CyberTask | Other Platforms |
|---|---|---|
| Browser-based access | ✅ Everything in browser | ❌ Often need VPN/local VM |
| Attack machine included | ✅ Kali Linux provided | ❌ Often bring your own |
| No setup required | ✅ Click and start | ❌ Complex configuration |
| Realistic networks | ✅ Multi-machine labs | ⚠️ Usually single targets |
| Instant feedback | ✅ Real-time scoring | ⚠️ Varies |
Ready to Start?
Now you know everything needed to use CyberTask labs effectively.
FAQ
Is CyberTask free to use?
CyberTask offers both free and premium labs. Many beginner challenges are available at no cost.
Do I need to install anything?
No. CyberTask provides all virtual machines, tools, and access directly in your browser. Just sign up and start.
How long do lab sessions last?
Session duration varies by lab. Most labs allow 1-4 hours of active time. You can always restart if needed.
Can I use my own tools?
Yes! While Kali Linux is provided with common tools, you can install additional tools or upload your own scripts.
What if I get stuck?
Most labs include hints. You can also use the support feature, check writeups (for completed challenges), or ask the community.
Conclusion
CyberTask makes hands-on cybersecurity training accessible to everyone. With browser-based access, pre-configured attack machines, and realistic lab environments, you can focus on learning instead of setup.
Start your first lab today and begin your cybersecurity journey!