Quantcast
Browsing all 283 articles
Browse latest View live

Cyberry: 1

InstructionsThe boot2root is a Debian virtual machine and has been fully tested using VMWare Workstation 12. The network interface of the virtual machine will take it's IP settings from...

View Article


USV: 2017

Difficulty: Beginner/IntermediateAbout: This is the VM used in the online qualifications phase of the CTF-USF 2017 (Capture the Flag - Suceava University) contest which addresses to universities...

View Article


Gemini Inc: 1

Name: Gemini Inc v1Date release: 2018-01-09Author: 9emin1Series: Gemini IncDescription:I have decided to create vulnerable machines that replicate the vulnerabilities and difficulties I’ve personally...

View Article

Damn Vulnerable ARM Router (DVAR): tinysploitARM

THE ARM IoT EXPLOIT LABORATORY - Damn Vulnerable ARM Router (DVAR)DVAR is an emulated Linux based ARM router running a vulnerable web server that you can sharpen your ARM stack overflow skills...

View Article

W1R3S: 1.0.1

You have been hired to do a penetration test on the W1R3S.inc individual server and report all findings. They have asked you to gain root access and find the flag (located in /root...

View Article


DerpNStink: 1

Difficulty:BeginnerDescription:Mr. Derp and Uncle Stinky are two system administrators who are starting their own company, DerpNStink. Instead of hiring qualified professionals to build up their IT...

View Article

Nineveh: v0.3

It was a part of HackTheBox platform.VulnHub

View Article

BlackMarket: 1

VM Name:BlackMarketVM Description:BlackMarket VM presented at Brisbane SecTalks BNE0x1B (28th Session) which is focused on students and other InfoSec Professional. This VM has total 6 flag and one r00t...

View Article


Pinky's Palace: v1

Box Info: Tested on VirtualBox using DHCP Host-only & Bridged Adapter types.File Type: OVABackground:Pinky is creating his very own website! He has began setting up services and some simple web...

View Article


JIS-CTF: VulnUpload

VM Name: JIS-CTF : VulnUploadDifficulty: BeginnerDescription: There are five flags on this machine. Try to find them. It takes 1.5 hour on average to find all flags.VulnHub

View Article

Bob: 1.0.1

Difficulty: Beginner/IntermediateBob is my first CTF VM that I have ever made so be easy on me if it's not perfect. The Milburg Highschool Server has just been attacked, the IT staff have taken down...

View Article

Pinky's Palace: v2

Description: A realistic Boot2Root. Gain access to the system and read the /root/root.txtNote: Only works in VMwareNetwork: Bridged/DHCPQuestions: Tweeeeeeter @Pink_P4ntherFile: OVFDifficulty to get...

View Article

BSides Vancouver: 2018 (Workshop)

Boot2root challenges aim to create a safe environment where you can perform real-world penetration testing on an (intentionally) vulnerable target.This workshop will provide you with a custom-made VM...

View Article


Trollcave: 1.2

Trollcave is a vulnerable VM, in the tradition of Vulnhub and infosec wargames in general. You start with a virtual machine which you know nothing about – no usernames, no passwords, just what you can...

View Article

Jarbas: 1

If you want to keep your hacking studies, please try out this machine!Jarbas 1.0 – A tribute to a nostalgic Brazilian search engine in the end of 90’s.Objective: Get root shell!VulnHub

View Article


Android4: 1

Name : Android4OS : Android v4.4Description : This is my Second booT2Root CTF VM..I hope you enjoy it. if you run into any issue you can find me on Twitter: @touhidshaikh22Flag : /data/root/ (in this...

View Article

Gemini Inc: 2

Name: Gemini Inc v2Date release: 2018-07-10Author: 9emin1Series: Gemini IncDescription: I have decided to create vulnerable machines that replicate the vulnerabilities and difficulties I’ve personally...

View Article


MinU: 1

Name: MinUv1Date Release: 2018-07-10Author: 8bitsecDescription: This boot2root is an Ubuntu Based virtual machine and has been tested using VirtualBox. The network interface of the virtual machine will...

View Article

GoldenEye: 1

I recently got done creating an OSCP type vulnerable machine that's themed after the great James Bond film (and even better n64 game) GoldenEye. The goal is to get root and capture the secret GoldenEye...

View Article

FourAndSix: 1

N/AVulnHub

View Article
Browsing all 283 articles
Browse latest View live