Category: Vulnhub
-

Funbox : Rookie
https://www.vulnhub.com/entry/funbox-rookie,520/ Review Enumeration Run nmap scan to find for open ports. Port 80 Run a gobuster scan to find for hidden directories. /logs/ gives us not found. FTP login Found some clues. Let’s use john to crack the zip files. The zip files contain the private keys. Foothold We are able to gain access via…
-

Funbox : Easy
https://www.vulnhub.com/entry/funbox-easy,526/ Review Enumeration gives us multiple pathways Use default credentials to gain access to an online bookstore Add a book that has a php reverse shell attached Once user access is gained , a password file is stored in the open SSH to the user and check for sudo permissions. Use GTFOBins to find for…
-

Vegeta: 1
https://www.vulnhub.com/entry/vegeta-1,501/ Review Enumeration uncovers hidden directories Check all the way to the bottom for clues Decode file and look out for double encoding Use a more through enumeration if stuck Decode a morse code to find for clues Check bash_histroy to find for clues Enumeration Run nmap scan to find for open ports. Run a…
-
Infosec Prep: OSCP
This machine was created for the InfoSec Prep Discord Server
-
hacklabs: no_name CTF
This a beginner level machine , getting a shell is a little bit harder, just think out of the box to get the shell.privilege escalation is easy once you get the shell. This machine has 3 flags. Each flag is present in the Home directory of particular user. Be ready to test your Linux skills.
-
FUNBOX: LUNCHBREAKER CTF
It’s a box for beginners and can be pwned in the lunch break.
-
RIPPER: 1 CTF
This is a vulnerable linux box focused on web application testing along with showing the importance of enumeration. There are three users you needs to compromise to read the root flag.
-

Pentester Lab: From SQL injection to Shell
This exercise explains how you can from a SQL injection gain access to the administration console. Then in the administration console, how you can run commands on the system.
-
TOPHATSEC: FRESHLY CTF
The goal of this challenge is to break into the machine via the web and find the secret hidden in a sensitive file.
-

Lin.Security:1
Here at in.security we wanted to develop a Linux virtual machine that is based, at the time of writing, on an up-to-date Ubuntu distro (18.04 LTS), but suffers from a number of vulnerabilities that allow a user to escalate to root on the box. This has been designed to help understand how certain built-in applications…
-
Basic Pentesting:1
This was a small boot2root VM created for a university’s cyber security group.

