Matrix: 1
Description: Matrix is a medium level boot2root challenge. The OVA has been tested on both VMware and Virtual Box.Difficulty: IntermediateFlags: Your Goal is to get root and read...
View ArticleCTF KFIOFan: 1
Description : Two french people want to start the very first fanclub of the youtuber Khaos Farbauti Ibn Oblivion. But they're not very security aware ! (IMPORTANT NOTE : The whole challenge is in...
View ArticleFowsniff: 1
I created this boot2root last year to be hosted on Peerlyst.com It's beginner level, but requires more than just an exploitdb search or metasploit to run.It was created in (and is intended to be used...
View Articledigitalworld.local: MERCY
Description: MERCY is a machine dedicated to Offensive Security for the PWK course, and to a great friend of mine who was there to share my sufferance with me. :-)MERCY is a name-play, and has nothing...
View ArticleMoonraker: 1
You've received intelligence of a new Villain investing heavily into Space and Laser Technologies. Although the Villian is unknown we know the motives are ominous and apocalyptic. Hack into the...
View ArticlePinky's Palace: v4
Pinky has setup a development environment to develop and test new software. He thinks his dev environment is pretty locked down security wise, what do you think?Network (DHCP) BridgedDifficulty for...
View ArticleTyphoon: 1.02
Typhoon Vulnerable VMTyphoon VM contains several vulnerabilities and configuration errors. Typhoon can be used to test vulnerabilities in network services, configuration errors, vulnerable web...
View ArticleRaven: 2
Raven 2 is an intermediate level boot2root VM. There are four flags to capture. After multiple breaches, Raven Security has taken extra steps to harden their web server to prevent hackers from getting...
View ArticleWebDeveloper: 1
A machine using the newest [SPOILER] Server, the newest [SPOILER] and containing some [SPOILER]....VulnHub
View ArticleGittysburg: 1
Gittysburg is an intermediate level boot2root vulnerable VM. There are four flags to capture. Will you be able to git root?VulnHub
View Articleisz-no: leopold
The machines are in the intermediate difficulity range. None of them should be as easy as to just run a msf module to get root right away, if so please let me know. They all have two flags, one for...
View Articleisz-no: jenkins
The machines are in the intermediate difficulity range. None of them should be as easy as to just run a msf module to get root right away, if so please let me know. They all have two flags, one for...
View Articleisz-no: ike
The machines are in the intermediate difficulity range. None of them should be as easy as to just run a msf module to get root right away, if so please let me know. They all have two flags, one for...
View Articleisz-no: eric
The machines are in the intermediate difficulity range. None of them should be as easy as to just run a msf module to get root right away, if so please let me know. They all have two flags, one for...
View Articleisz-no: christophe
The machines are in the intermediate difficulity range. None of them should be as easy as to just run a msf module to get root right away, if so please let me know. They all have two flags, one for...
View ArticleReplay: 1
Replay is a sequel to Bob my first CTF. What sort of terrible redneck netsec engineering has Bob done now? Your Goal is to get root and read /flag.txt Note: There are three difficulties Hard: No...
View Article