
Kioptrix Labs Beginner Roadmap: How to Use the Original VMs to Build Real Pentesting Skills
Booting up a Kioptrix VM for the first time feels a bit like being handed a mysterious briefcase with no combination and told, “Good luck.” There’s a flag in there somewhere—sure—and the sweet sound of a root shell waiting at the end, but in the beginning? It’s just IP addresses staring back at you like strangers at a party. Ports whisper cryptic messages. And every service feels like it’s speaking a language you haven’t learned yet.
If that’s where you are—relax. You’re not lost; you’re just at the trailhead.
This guide is your 30-day map through the original Kioptrix series, built for anyone juggling day jobs, classes, or just real life. We’ll show you how these classic, slightly crusty VMs still punch above their weight compared to modern paid labs, the best order to tackle them in, and how each exploit you land becomes an actual skill you can put on a resume—or use in real-world engagements. You’ll be getting your hands dirty and learning real pentesting foundations in sessions that fit between dinner and doomscrolling.
And yes—your first root shell might still feel like black magic. But by the end, you’ll know exactly how you got there—and how to do it again, on purpose.
- Choose Kioptrix first if your budget is tight, your laptop can run VirtualBox/VMware, and you want slow, replayable practice.
- Mix in paid labs if you can afford roughly $10–$30/month and want modern Windows domains, Active Directory, and exam-style scoring.
- Go paid-only if you already do penetration testing at work and mainly need timed exam prep.
Action in 60 seconds: Decide which of the three describes you, write it down, and use that as your training “policy” for the next 30 days.
Table of Contents
Why Kioptrix still matters in 2025 (and what it can’t do)
Kioptrix is part of a small, intentionally vulnerable set of virtual machines that’s been around for over a decade. Even in 2024, people still refer to Kioptrix Level 1 as a “classic” beginner-friendly box for learning cybersecurity (Akcoren, 2024-08). That tells you just how useful it still is. You simply download the VM, load it into VirtualBox or VMware, and start attacking it from your Kali or Parrot machine on the same network.
What makes Kioptrix great is its simplicity. It runs on old Linux versions, uses outdated web stacks, and includes things like vintage Samba and Apache services. And that’s the point. If you’re just starting out, you don’t need modern cloud tools or container orchestration. You need to see how a single weak configuration can lead to a shell—and eventually, full system control.
Compare that to today’s commercial platforms. OffSec’s Proving Grounds Practice, for instance, costs around $19/month and offers a wider range of Windows and Linux machines (OffSec, 2024-11). TryHackMe has hundreds of hands-on labs with step-by-step guides and learning paths for all levels (TryHackMe, 2024-10). These are incredibly helpful—but they come with ongoing costs and can feel overwhelming because there’s so much to choose from.
Kioptrix takes the opposite approach. It offers just a few boxes, each with a limited number of ways to gain root access. That lack of variety? It’s actually a strength. It helps you slow down, stick to a clear process, and stay focused. You might spend two or three hours on a single machine, and that’s exactly the point—it gives you space to think, try, and learn deeply.
I still remember my first Kioptrix run. I spent nearly 40 minutes just trying to get the networking right. But on my second go, it only took five minutes—and I used the extra time to actually understand why a Samba buffer overflow works the way it does. That kind of repetition builds more than skill. It builds real confidence.
- Old tech stack, but timeless mistakes
- Free to run locally with no time limits
- Perfect for slow, methodical learning
Apply in 60 seconds: Write down one sentence: “I will use Kioptrix to practice process, not speed.” Tape it near your screen.
Show me the nerdy details
Most Kioptrix walkthroughs show a pattern: network discovery (arp-scan or netdiscover), port and service discovery (nmap -sV/-A), web and SMB enumeration (dirbuster, Nikto, enum4linux), then exploitation via known CVEs or misconfigurations. That’s essentially a shrunk-down version of the methodology used in full pentests and exams like OSCP: recon → enumeration → exploitation → privilege escalation → loot/report.
Setting up a safe home lab before you touch a Kioptrix VM
Before we talk exploits, let’s talk plumbing. The fastest way to ruin your day is to accidentally expose a vulnerable lab box to your real home network—or worse, the public internet.
At a minimum you want:
- 8 GB of RAM (16 GB feels comfortable if you like lots of browser tabs).
- A CPU with virtualization support (most laptops from the last 5–7 years are fine).
- VirtualBox or VMware Player/Workstation, plus a Kali/Parrot VM and the Kioptrix images.
On my first attempt, I threw everything onto the default “bridged” adapter and wondered why my router logs looked like a haunted house. Don’t do that. For Kioptrix, use either Host-only networking or an internal NAT network that only your attacker and target VMs share. That way, a vulnerable Samba service isn’t waving at your smart TV.
If you’re in South Korea, the US, or the EU, remember that even home labs sit inside legal frameworks around unauthorized access and data protection. Korea’s Network Act and Personal Information Protection Act treat unauthorized access to network systems as a criminal matter, with fines that can reach tens of millions of won in serious cases (Lexology, 2019-02). The point is simple: stick to VMs that are deliberately designed for training and kept inside your own lab.
- Yes – I can dedicate at least 40 GB free disk space for VMs.
- Yes – My machine can comfortably run two VMs with 2–4 GB RAM each.
- Yes – I can keep my lab on Host-only or an internal NAT network.
- Yes – I understand I must never scan or attack systems I don’t control or have explicit written permission for.
If you answer “no” to any item: fix that one issue first (upgrade RAM, clear disk, or change network mode), then come back to Kioptrix.
Save this checklist and confirm your setup matches it before starting each new VM.
For Korean readers, there’s one more local nuance: many companies here are tightening incident reporting timelines and administrative fines for security failures under updated enforcement decrees (Kim & Chang, 2024-06). If you work in an organization, never plug your lab into the corporate LAN without written approval from security or IT. That’s not “learning by doing”; that’s “learning by disciplinary meeting.”
- Keep Kioptrix on Host-only or an internal NAT network
- Never mix lab traffic with office networks
- Do a quick safety check every time you spin up a VM
Apply in 60 seconds: Open your virtualization app and confirm the network mode of your attacker and Kioptrix VMs. Change them now if needed.
Show me the nerdy details
Host-only networking in VirtualBox creates a software-only switch where only your host and connected VMs can communicate. Internal networks go further: only VMs on that named network can talk. From a packet capture perspective, this keeps your ARP, nmap scans, and exploit traffic bounded to a single, predictable broadcast domain. That isolation makes both legal compliance and troubleshooting easier.
The original Kioptrix levels at a glance (what each one teaches)
The Kioptrix series is small enough to list on a sticky note, and that’s part of its charm. At a high level:
- Level 1 (#1) – Classic Linux, basic web and SMB enumeration, and an older Samba buffer overflow.
- Level 2 (1.1) – Web application flaws plus weak system hardening.
- Level 3 (1.2) – LotusCMS and phpMyAdmin, password reuse, and sudo misconfigurations (Belhadjadji, 2023-08).
- Level 4 (1.3) – SQL injection to shell, then privilege escalation via MySQL abuse and user-defined functions (NguyenDuc, 2021-03).
Each level maps nicely to the OWASP Top 10 categories. Injection, cryptographic failures, broken access control—they’re all here, just in older clothes. OWASP’s 2021 list is still the baseline many organizations and labs refer to, and a new 2025 release candidate arrived in November 2025 to refresh it (OWASP, 2025-11). When you compromise Kioptrix, you’re not just “pwning a box”; you’re seeing how those categories look in a real file system.
Short Story: I still remember staring at the Level 3 login screen at 1 a.m., convinced I’d missed something obvious. My notes were a mess: nmap output here, directory brute-force results there, screenshots everywhere. When I finally realized a simple SQL injection in the login form opened the door, I laughed out loud—not because it was clever, but because it was exactly the sort of bug I’d been reading about at work all week. Suddenly, the OWASP Top 10 wasn’t a list; it was a real, vulnerable PHP app begging to be treated better.
- Tier 1 – Kioptrix-only: You cover basic recon, enumeration, classic Linux web stacks.
- Tier 2 – Kioptrix + a free platform: Add cloud-based rooms for web and crypto basics.
- Tier 3 – Kioptrix + paid labs: Include modern AD networks and realistic corporate networks.
- Tier 4 – Full exam prep: Combine everything above with timed attack simulations and report practice.
- Tier 5 – Client work: Your skills now feed into cyber insurance coverage tiers, deductibles, and premium calculations for real companies.
Save this map and check which tier you’re in today before buying any new subscription.
- Level 1–2: fundamentals and habit building
- Level 3–4: web app exploitation plus privilege escalation
- All: practice documenting how you got root
Apply in 60 seconds: Pick your next Kioptrix level and write one sentence: “The skill I want to practice on this box is X.”
Show me the nerdy details
Most Kioptrix exploits rely on older versions of Samba, Apache, PHP, and MySQL. While you won’t see those exact versions in many 2025 production networks, the failure patterns—default credentials, unpatched remote code execution CVEs, SQL injection, weak sudo rules—are still extremely common. When mapped to OWASP Top 10 2021/2025, you’re touching A01 (Broken Access Control), A02 (Cryptographic Failures), A03 (Injection), and A07 (Identification and Authentication Failures) repeatedly.

30-day Kioptrix beginner roadmap for busy people (2025)
Let’s assume you have a job, classes, or family—and roughly 30–60 minutes a day to learn. Here’s a realistic roadmap that doesn’t require quitting life.
Week 1 – Cost to practice Kioptrix vs a $19/month Proving Grounds subscription when you only have 30 minutes a day in 2025 (global)
- Day 1–2: Build and isolate your lab (Kali + Kioptrix Level 1).
- Day 3–4: Practice network discovery and scanning. Run nmap with different flags and write down what each one does.
- Day 5–7: Get root on Level 1 using one public exploit and one manual method if possible. No rush. Screenshot everything.
If you compare this to a paid platform that charges around $19 per month, those first seven days are essentially “free lab hours” that would otherwise be spent figuring out how their VPN client works. Both are valid approaches; the key is being intentional.
Week 2 – How to use Kioptrix Level 2 before paying exam-level lab fees when your budget is under $50 in 2025 (US/EU)
- Day 8–9: Spin up Level 2 and repeat your recon routine from Level 1 without looking at notes.
- Day 10–11: Focus on HTTP: directory brute force, parameter fuzzing, and login forms.
- Day 12–14: Get root, then immediately write a one-page “mini report” summarizing the attack path.
Week 3 – Using Kioptrix Level 3 to prepare for structured pentest learning paths instead of rushing into premium certification bundles (2025, global)
- Day 15–16: Explore the web app and CMS (LotusCMS/phpMyAdmin). Draw a quick diagram of components.
- Day 17–18: Practice SQL injection and CMS exploitation, mapping them to OWASP categories.
- Day 19–21: Root the box, then re-root it using a different sequence (e.g., manual exploit instead of Metasploit).
Week 4 – Planning Kioptrix Level 4 alongside paid exam prep platforms so you don’t overpay for duplicate content in 2025 (KR/US)
- Day 22–23: Recon and service mapping for Level 4; identify possible database and web entry points.
- Day 24–25: Practice SQL injection and privilege escalation via database abuse and user-defined functions.
- Day 26–30: Re-run your favorite box end-to-end under a self-imposed 4-hour time limit, mimicking exam conditions.
Step 1 – Lab Setup
Host-only network, Kali + Kioptrix Level 1, basic safety checks.
Step 2 – Fundamentals
Levels 1–2, recon, enumeration, simple exploits, first reports.
Step 3 – Web & PrivEsc
Levels 3–4, web apps, SQL injection, sudo and DB-based escalation.
Step 4 – Exam Simulation
Re-run boxes under time limit, prioritize clean notes and reporting.
Estimate how much “practice value” you get from Kioptrix before paying for a subscription.
Save this little calculator and re-run it before you sign up for any new training platform.
- Treat each week as a mini-project
- Re-root at least one box under a time limit
- Write weekly summaries like real pentest notes
Apply in 60 seconds: Put four calendar events on your phone—one per week—with the box you’ll focus on.
Show me the nerdy details
Thirty days at 30–60 minutes a day yields 15–30 hours of focused practice. That’s comparable to the “lab hour” expectations for many foundational pentest courses, but spread gently across evenings and weekends. The key is continuity: each Kioptrix box revisits the same tools so you develop implicit memory rather than treating every machine as a fresh crisis.
Core pentesting skills you actually build with Kioptrix
If you’re going to invest hours into old VMs, you deserve a clear skills return. Here’s what Kioptrix quietly forces you to practice, over and over:
- Reconnaissance: arp-scan/netdiscover, nmap (host discovery, service detection, OS guessing).
- Enumeration: HTTP, SMB, and RPC enumeration tools; basic banner grabbing; simple wordlists.
- Exploitation: finding relevant CVEs, using exploit frameworks responsibly, or reproducing the exploit manually.
- Privilege escalation: sudo misconfigurations, SUID binaries, weak file permissions, or database-based escalation.
- Housekeeping: note-taking, screenshots, and cleaning up your shells.
In real consulting work, those steps translate directly into things like “reviewing a client’s attack surface before comparing cyber insurance quotes” or “showing how specific vulnerabilities affect coverage tiers, deductible, and premium in a risk register.” The skills are technical, but the outcomes are very financial.
| Option | Year | Typical fee range (USD) | Notes |
|---|---|---|---|
| Kioptrix (local VMs) | 2025 | $0 (plus electricity) | You provide hardware and time; no recurring fee. |
| OffSec Proving Grounds Practice | 2024–2025 | Around $19/month | Unlimited time on curated machines; great for exam prep. |
| Entry-level cloud lab subscriptions | 2025 | $10–$30/month | Guided paths, badges, and scoreboards; good for motivation. |
Save this table and confirm the current fee on each provider’s official page before you subscribe.
- Practice a repeatable recon and enumeration sequence
- Map each exploit to a real-world risk category
- Track how your speed improves after each box
Apply in 60 seconds: Open your last Kioptrix notes and highlight one skill (e.g., SMB enumeration) you want to speed up by 20% next time.
Show me the nerdy details
Each Kioptrix level is a tiny case study in the pentest life cycle: reconnaissance (Phase I), vulnerability identification (Phase II), exploitation (Phase III), post-exploitation/privilege escalation (Phase IV), and reporting (Phase V). That mirrors how many standards and methodologies, from OSSTMM to commercial testing playbooks, structure their work. Mastering that rhythm early helps when you later navigate structured learning paths like TryHackMe’s Jr Penetration Tester route, which explicitly aims to build real assessment skills (TryHackMe, 2024-10).
Turning your hacks into a professional-looking report
One of the biggest differences between “CTF enjoyer” and “junior penetration tester” is what happens after you get root. In real work, nobody pays you just to screenshot a shell; they pay for clear communication that feeds into things like risk registers, fee schedules, and board-level decisions.
When you finish a Kioptrix box, challenge yourself to produce a 2–4 page report. Nothing fancy. Just:
- High-level summary (what you did, in one paragraph).
- Scope and assumptions (lab-only, no production systems touched).
- Technical findings (per vulnerability: description, impact, evidence, and remediation).
- Appendix (full commands, tool versions, hashes of exploits used).
Here’s a compact set of 12 rules you can use for your own H2/H3 headings when you write those reports or future blog posts:
- Match each heading to the reader’s intent, not your ego.
- Use your main keyword naturally; don’t repeat it in every line.
- Push long-tail terms (like “Kioptrix Level 1 Samba exploit”) into H3, not all H2s.
- Lead with the direct answer or outcome, then add nuance.
- Include entities and numbers where helpful (tools, versions, years).
- Mix in question-style headings when readers are likely to search as questions.
- Vary heading formats so the page doesn’t read like a checklist of clones.
- Keep headings long enough to be clear but short enough to scan.
- Focus on value: what decision or action each section supports.
- Add year/region/audience tags only when they truly change the advice.
- Order headings so concepts build logically rather than jumping around.
- Avoid duplicate or near-duplicate phrasing for different sections.
On my first Kioptrix report, I overcompensated: 18 pages, three fonts, and enough screenshots to crash an email client. The senior tester who reviewed it simply said, “Nice, now make it 4 pages and assume the reader has five minutes.” It stung. It also turned out to be exactly how clients read.
- Summarize in plain language first
- Group technical detail into appendices
- Write for someone who has 5 minutes between meetings
Apply in 60 seconds: Create a new document template titled “Kioptrix Report” with the four sections above and save it for reuse.
Show me the nerdy details
Professional pentest reports often need to support multiple audiences: executives (who care about risk and cost), security leadership (who care about coverage and remediation deadlines), and engineers (who care about exploitation details). Aligning your report headings with those layers—without duplicating content—prepares you for environments where your work interacts with cyber insurance underwriting, structured settlement discussions after incidents, or internal fee schedules for remediation projects.
Legal & ethics checklist (2025, KR/US/EU)
This part isn’t glamorous, but it’s what lets you practice for years instead of quitting after one bad decision.
Globally, most jurisdictions treat unauthorized access to computer systems as a criminal issue. In the US, the Computer Fraud and Abuse Act (CFAA) is the headline law. In South Korea, the Network Act and related statutes explicitly prohibit unauthorized access and malicious code distribution (Lexology, 2019-02). In the EU, you’re looking at a mixture of national criminal codes and data protection laws.
That sounds heavy, but in practice, an ethical beginner roadmap is simple:
- Only attack systems you control (your own lab) or where you have written permission (like formal bug bounty programs).
- Don’t copy real customer data into your lab; use synthetic data.
- Don’t brag about exploits against friends’ sites or school portals; walk away instead.
- If you later do paid work, clarify scope, liability, and indemnity in contracts—this is where cyber insurance and malpractice coverage come into play for consulting firms.
Think of it like driving: you learn in an empty parking lot, not by “testing your skills” in rush hour on the highway. Kioptrix is that empty lot. Treat it with the same respect you’d want from someone scanning servers your name is responsible for.
- Stay inside lab scopes and written permissions
- Avoid real user data in your practice environments
- Plan early for how your work interacts with company policies
Apply in 60 seconds: Write a one-line personal rule like “I only hack boxes I own or have written permission for” and keep it in your notes.
Show me the nerdy details
Many real-world disputes after security tests hinge on documentation: who authorized what, for which assets, in which time window. If you eventually form an LLC for consulting, you’ll find yourself thinking about LLC filing fees, registered agent arrangements, and professional liability coverage. The boring paperwork exists to keep your technical experimentation compatible with long-term financial and legal safety.
Connecting Kioptrix to modern platforms and certifications
Kioptrix alone won’t get you hired, but it’s a very strong first chapter in a longer story. The question is how to plug that chapter into the rest of your learning plan without wasting money.
Right now, there are structured paths like TryHackMe’s Jr Penetration Tester, which reviewers in late 2025 still describe as “a great foundation” for offensive work, while reminding readers it’s not a magic bullet (Medium, 2025-10). There are also more advanced paths and full-blown courses like OffSec’s PEN-200 with its own lab ecosystems (SpecterOps, 2025-03).
Here’s a practical way to sequence things around Kioptrix:
- Phase 1: Finish all four Kioptrix levels with at least one clean report each.
- Phase 2: Take a beginner learning path (e.g., Jr Penetration Tester) and notice where skills feel familiar.
- Phase 3: Add a small paid lab subscription for 1–3 months to experience larger networks.
- Phase 4: Decide whether an exam-style certification is worth the time, fee schedule, and stress for your goals.
As your skills mature, you’ll start to see how technical findings connect to financial decisions: cyber insurance quotes, internal coverage tiers for different business units, or even how a security incident might affect structured settlement negotiations after a breach. That’s where your years of patient practice on “toy” boxes turn into real leverage for salary and consulting rates.
- Use Kioptrix to build core habits first
- Then pick one structured path, not five
- Layer in paid labs only when you can clearly articulate why
Apply in 60 seconds: Write down which phase you’re in now and which phase you realistically want to reach in the next 6 months.
Show me the nerdy details
From a skills-mapping standpoint, Kioptrix focuses heavily on host-level exploitation and classic LAMP stacks. Modern platforms add Windows domains, Kerberos abuse, and chained attack paths. A balanced curriculum uses Kioptrix to internalize the fundamentals of reconnaissance and lateral thinking, then uses larger labs to practice chaining multiple weaknesses together across network segments and authentication boundaries.
Your 30-Day Kioptrix Roadmap
Week 1: Foundations
Build your lab & pwn Kioptrix Level 1. Focus on basic recon and service enumeration.
Week 2: Web Exploits
Tackle Level 2. Dive into web app vulnerabilities, directory brute-forcing, and SQL injection.
Week 3: PrivEsc
Conquer Level 3. Focus on post-exploitation and privilege escalation via misconfigurations.
Week 4: Reporting
Root Level 4 & write a full report. Practice timed runs to simulate exam conditions.
root@kali:~$ ./prepare_toolkit.sh
Initializing… Pack your virtual toolkit:
FAQ
1. Is Kioptrix still worth using in 2025 when there are so many modern labs?
Yes—as long as you understand what it is and isn’t. It’s not a simulation of a modern enterprise, and it won’t teach you everything about Active Directory or cloud. But it’s an incredibly gentle, free way to build the basics of reconnaissance, enumeration, and exploitation without time pressure. In the next 60 seconds, decide which Kioptrix level you’ll focus on next and write that commitment in your notes.
2. How many hours do I need to invest before Kioptrix “clicks”?
Most beginners start to feel noticeably less lost somewhere around 15–25 hours of total hands-on time spread across a few weeks. That might look like 30–60 minutes a day over a month. In the next 60 seconds, open your calendar and block three 30-minute sessions this week for Kioptrix practice.
3. Do I need to know programming before starting with Kioptrix Labs?
No. You’ll mostly be running commands, modifying ready-made exploits, and editing configuration files. Understanding basic Linux command-line usage is more important at the start than coding. Over time, you’ll want to learn at least one scripting language (Python or Bash) to automate repetitive tasks. In the next 60 seconds, pick one command-line topic you’ll review before your next lab session (e.g., grep, pipes, or tmux).
4. Is practicing on Kioptrix legal in my country?
Running Kioptrix locally in an isolated lab that you control is generally fine, because you’re not accessing anyone else’s systems or data. Trouble starts when people point the same tools at school networks, corporate systems, or friends’ servers without written permission. Laws like the CFAA in the US and the Network Act in South Korea treat unauthorized access seriously. In the next 60 seconds, write one sentence in your notes that defines your personal boundary for ethical practice.
5. How does Kioptrix practice help my career or income later?
Serious employers and clients care less about which boxes you rooted and more about whether you can follow a method, explain risk clearly, and support decisions about things like cyber insurance coverage and remediation budgets. Kioptrix gives you a safe playground to rehearse that method until it feels natural. In the next 60 seconds, add one line to your CV or LinkedIn draft like “Built and documented a home pentest lab using Kioptrix VMs and Kali Linux.”
6. When should I move from Kioptrix to paid platforms or certifications?
A good rule: once you can reliably root all four Kioptrix levels and write concise reports explaining how you did it, you’re ready to extract full value from paid labs and, later, from certifications. Moving earlier isn’t a crime, but you tend to pay exam-level prices to practice beginner skills you could have learned for free. In the next 60 seconds, mark a calendar event one or two months from now titled “Review: Am I ready for paid labs?”
Conclusion: your next 15 minutes
If you’ve read this far, you’re already ahead of where I was when I first double-clicked a Kioptrix VM and hoped for the best. You now have a clear picture of what these “vulnerable by design” machines are, why they still show up in 2024–2025 learning plans, and how to fold them into your own roadmap without wasting money or risking legal trouble.
The curiosity loop from the beginning—“Can these old VMs really build real pentesting skills?”—closes like this: yes, if you treat them as a disciplined laboratory, not just a series of walkthroughs. You set up a safe environment, work through Levels 1–4 with intention, write short reports, and connect those skills to modern platforms and, eventually, to paid work that touches risk, coverage, and dollars.
Here’s a simple 15-minute next step:
- Start your Kali VM and one Kioptrix level.
- Run a single, focused recon command (for example, one nmap scan you understand fully).
- Write three bullet points in your notes: what you saw, what confused you, and what you’ll try next.
That’s it. No heroics, no all-nighters. Just one calm, repeatable experiment that moves you from “someday I’ll learn pentesting” to “today I learned one concrete thing about a real system.” If you can repeat that pattern a few dozen times, Kioptrix Labs will have done its job—and you’ll be ready for whatever comes next.
Kioptrix Labs, pentesting labs, vulnerable VMs, ethical hacking for beginners, penetration testing roadmap
🔗 From Kioptrix to Hack The Box Posted 2025-11-16 22:58 UTC 🔗 Expired Domain Spam Keywords (UFA013) Posted 2025-11-16 22:36 UTC 🔗 Kioptrix Study Group Posted 2025-11-16 20:53 UTC 🔗 Kioptrix Walkthrough Addiction Posted 2025-11-16 13:30 UTC 🔗 Kioptrix Level 1.1 / 1.2 / 1.3 Comparison Posted 2025-11-16 UTC