How to Use CyberTask Labs: Complete Beginner's Guide

How to Use CyberTask Labs: Complete Beginner's Guide

January 1, 2025·
CyberTask Team

TL;DR

CyberTask provides everything you need to start hacking — virtual machines, Kali Linux, Windows targets, and browser-based access. Just click Run, wait 2-5 minutes for machines to boot, and start learning. No local setup required.


What You’ll Learn

  • How to start a lab environment
  • How to access Windows and Kali Linux machines
  • How to submit answers and flags
  • How to use the network topology view
  • Tips for Firefox users and troubleshooting

Prerequisites

  • A CyberTask account (create one here)
  • A modern web browser (Chrome, Firefox, Edge, or Safari)
  • That’s it! No VMs, no VPN, no local tools needed
CyberTask provides everything you need directly in your browser — including attack machines, target machines, and all necessary tools.

Step 1: Understanding the Lab Interface

When you open any lab on CyberTask, you’ll see three main panels:

Panel Purpose
Machine Access virtual machines directly in your browser
Browser Built-in web browser for testing web applications
Network Visual topology showing all machines in the lab

The lab interface is designed to give you a complete hacking environment without leaving your browser.


Step 2: Starting the Lab Network

Every lab includes a network of virtual machines ready for you to use.

How to start:

  1. Click the “Run” button at the top right corner of your screen
  2. Wait 2-5 minutes for machines to initialize
  3. The progress indicator will show when machines are ready
  4. Once ready, you can access any machine in the network
Some complex labs with multiple machines may take a few extra minutes to fully boot. The platform will notify you when everything is ready.

Step 3: Accessing Your Attack Machine (Kali Linux)

CyberTask provides a fully configured Kali Linux machine as your attack platform.

What’s included:

  • Pre-installed hacking tools (Nmap, Burp Suite, Metasploit, etc.)
  • Full terminal access
  • GUI desktop environment
  • Network connectivity to target machines

To access Kali Linux:

  1. Go to the Machine tab
  2. Select the Kali Linux machine from the list
  3. Click to connect — it opens directly in your browser
  4. Start using terminal or GUI tools immediately
No need to install Kali locally or configure VPNs. Everything runs in the cloud and streams to your browser.

Step 4: Accessing Target Machines (Windows/Linux)

Labs include various target machines depending on the challenge:

Machine Type Common Uses
Windows Server Active Directory, privilege escalation
Windows Desktop Client-side attacks, malware analysis
Linux Servers Web apps, privilege escalation, CTF challenges
Network Devices Router/firewall configuration challenges

To access target machines:

  1. Go to the Machine tab
  2. Select the target machine you want to access
  3. Connect via browser-based RDP, SSH, or VNC
  4. Credentials are provided in the lab description when needed

Step 5: Using the Network Topology View

The Network tab shows a visual map of all machines in the lab.

Why it’s useful:

  • See how machines are connected
  • Understand network segments and subnets
  • Plan your attack path
  • Identify target IPs quickly

This is especially helpful for complex labs with multiple machines and network segments.


Step 6: Submitting Answers and Flags

As you complete tasks, you’ll need to submit answers or capture flags.

Answer format rules:

Rule Example
Case insensitive Friday, friday, FRIDAY all work
Order doesn’t matter If answer is 80, 443, 8080, then 443, 8080, 80 is accepted
Flag format Usually CTF{...} or as specified in the challenge

To submit:

  1. Find the answer/flag on the target system
  2. Enter it in the submission field for that task
  3. Click submit — instant feedback on correctness
  4. Move to the next task

Step 7: Downloading Attachments

Some labs include files you’ll need for the challenge:

  • Exploit scripts
  • Wordlists
  • Configuration files
  • Evidence files for forensics

To download:

  1. Look for the attachment icon next to tasks
  2. Click to download directly to your attack machine
  3. Files are also accessible from your browser

Tips for Firefox Users

Firefox users need to enable clipboard access for copy/paste to work in virtual machines.

How to enable copy/paste:

  1. Type about:config in Firefox’s URL bar
  2. Accept the warning and continue
  3. Search for asyncClipboard
  4. Set all listed items to true
  5. Refresh the CyberTask page

This allows you to copy/paste between your local machine and the virtual machines.


Troubleshooting

Machine won’t start?
  • Wait the full 2-5 minutes for boot
  • Try clicking “Run” again
  • Check your internet connection
  • Contact support if issues persist
Can’t connect to machine?
  • Ensure the machine status shows “Running”
  • Try refreshing the browser
  • Clear browser cache and cookies
  • Try a different browser
Copy/paste not working?
  • Firefox: Follow the asyncClipboard instructions above
  • Chrome/Edge: Should work by default
  • Try using the on-screen keyboard if available
Need help during a lab?
  • Use the Support button in the lab interface
  • Check the lab’s hints if available
  • Ask in the CyberTask community

What Makes CyberTask Different?

Feature CyberTask Other Platforms
Browser-based access ✅ Everything in browser ❌ Often need VPN/local VM
Attack machine included ✅ Kali Linux provided ❌ Often bring your own
No setup required ✅ Click and start ❌ Complex configuration
Realistic networks ✅ Multi-machine labs ⚠️ Usually single targets
Instant feedback ✅ Real-time scoring ⚠️ Varies

Ready to Start?

Now you know everything needed to use CyberTask labs effectively.


FAQ

Is CyberTask free to use?

CyberTask offers both free and premium labs. Many beginner challenges are available at no cost.

Do I need to install anything?

No. CyberTask provides all virtual machines, tools, and access directly in your browser. Just sign up and start.

How long do lab sessions last?

Session duration varies by lab. Most labs allow 1-4 hours of active time. You can always restart if needed.

Can I use my own tools?

Yes! While Kali Linux is provided with common tools, you can install additional tools or upload your own scripts.

What if I get stuck?

Most labs include hints. You can also use the support feature, check writeups (for completed challenges), or ask the community.


Conclusion

CyberTask makes hands-on cybersecurity training accessible to everyone. With browser-based access, pre-configured attack machines, and realistic lab environments, you can focus on learning instead of setup.

Start your first lab today and begin your cybersecurity journey!