Category: Hacking
-
DVWA Brute Force attack (low-security) with Burp suite
Bruteforce attack using Burpsuite
-
Lin.Security:1
Here at in.security we wanted to develop a Linux virtual machine that is based, at the time of writing, on an up-to-date Ubuntu distro (18.04 LTS), but suffers from a number of vulnerabilities that allow a user to escalate to root on the box. This has been designed to help understand how certain built-in applications…
-
OWASP Juice Shop
Within this room, we will look at OWASP’s TOP 10 vulnerabilities in web applications. You will find these in all types of web applications. But for today we will be looking at OWASP’s own creation, Juice Shop!
-
Python Port Scanner
Simple python port scanner project to understand how comprehensive tools like Nmap funtcion
-
Tomghost CTF
Identify recent vulnerabilities to try exploit the system or read files that you should not have access to.
-
Pickle Rick CTF
This Rick and Morty themed challenge requires you to exploit a webserver to find 3 ingredients that will help Rick make his potion to transform himself back into a human from a pickle.
-
Bounty Hunter
You were boasting on and on about your elite hacker skills in the bar and a few Bounty Hunters decided they’d take you up on claims! Prove your status is more than just a few glasses at the bar. I sense bell peppers & beef in your future!
-
THM Basic Pentesting
This is a machine that allows you to practise web app hacking and privilege escalation
-
HTB Tier 0 CTF
STARTING POINT Tier 0 Machines https://app.hackthebox.com/starting-point Meow Use nmap to scan for open ports : sudo nmap -sS 10.129.115.157 telnet to machine with username root ls and cat flag.txt to get the flag 🏴☠️ HTB{b40abdfe23665f766f9c61ecba8a4c19} Fawn Use nmap to scan for open ports : sudo nmap -sS -sV 10.129.115.194 Login via FTP using anonymous user…
-
Basic Pentesting:1
This was a small boot2root VM created for a university’s cyber security group.