Quantcast
Browsing all 283 articles
Browse latest View live

SP: ike (v1.0.1)

Flags/root/flag.txt/home/ike/flag.txtTested with VirtualBoxDHCPDifficulty: IntermediateThe machines are in the intermediate difficulty range. None of them should be as easy as to just run a msf module...

View Article


HackInOS: 1

HackinOS is a beginner level CTF style vulnerable machine. I created this VM for my university’s cyber security community and all cyber security enthusiasts. I thank to Mehmet Oguz Tozkoparan, Ömer...

View Article


HackInOS: 1

HackinOS is a beginner level CTF style vulnerable machine. I created this VM for my university’s cyber security community and all cyber security enthusiasts. I thank to Mehmet O?uz Tozkoparan, Ömer...

View Article

unknowndevice64: 1

Description: unknowndevice64 v1.0 is a medium level boot2root challenge. The OVA has been tested on both VMware and Virtual Box.Difficulty: IntermediateFlags: Your Goal is to get root and read...

View Article

DC: 1

DescriptionDC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.It was designed to be a challenge for beginners, but just how easy it is...

View Article


HappyCorp: 1

+- - - - - - - - - - - - - -|- - - - - - - - - - - - - - -+ | Name: Happycorp | IP: DHCP | | Date: 2019-March-05 | Goal: Get Root! | | Author: Zayotic | Difficultly: ??? | +- - - - - - - - - - - - -...

View Article

DC: 2

DescriptionMuch like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.As with the original DC-1, it's designed with...

View Article

DC: 3

DescriptionDC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.As with the previous DC releases, this one is designed with beginners...

View Article


unknowndevice64: 2

Description: unknowndevice64 v2.0 is a beginner level boot2root challenge. The OVA has been tested on both VMware (with some fix provided in this video https://www.youtube.com/watch?v=scRpxo8fra4) and...

View Article


digitalworld.local: TORMENT

This is the evil twin of JOY. Unlike JOY, this machine is designed to drive you crazy. Stephen Hawking once mentioned, "God plays dice and throws them into places where they cannot be seen."The dice...

View Article

digitalworld.local: JOY

Does penetration testing spark joy? If it does, this machine is for you.This machine is full of services, full of fun, but how many ways are there to align the stars? Perhaps, just like the child in...

View Article

Overflow: 1

A new machine works in VirtualBox. Two flags: user and root. Some easy overflow stuff.VulnHub

View Article

Sputnik: 1

N/AVulnHub

View Article


DC: 4

DescriptionDC-4 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.Unlike the previous DC releases, this one is designed primarily for...

View Article

SP: harrison

Can you break free from Harrison's prison?Flags - /root/flag.txtTested with VirtualBoxDHCP enabledDifficulty: IntermediateShould not be as easy as to just run a MSF module to get root right away, if so...

View Article


Zeus: 1

Description: Zeus is an intermediate level boot2root VM. Your goal is to get root and read the flags. Tested on VMware.Difficulty: MediumFlags: user.txt and root.txtNetworking: Static IP ~...

View Article

DC: 5

DescriptionDC-5 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.The plan was for DC-5 to kick it up a notch, so this might not be...

View Article


Cybero: 1

middle-class labThere are different tasks in the lab. It is very joyful.VulnHub

View Article

DC: 6

DescriptionDC-6 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.This isn't an overly difficult challenge so should be great for...

View Article

Silky-CTF: 0x02

This is the second Simple Boot2root for the Security Hackadeny (https://www.security-hackademie.de/) and for virtualbox. Try to break in and get the User and root FlagVulnHub

View Article
Browsing all 283 articles
Browse latest View live