Pentesting Labs

Hello! I’m a SOC analyst and cybersecurity enthusiast. In my free time, I enjoy practicing on CTFs and writing up about them.


In today’s ever-evolving digital landscape, it is essential for cybersecurity professionals to continually improve their skills and knowledge to protect organizations from the growing threat of cyber attacks. To this end, I have taken a proactive approach to learning by seeking out and utilizing a range of penetration testing style labs that have proven to be highly effective in enhancing my proficiency in various cybersecurity defensive domains.

These labs feature vulnerable machines and past CTFs, providing an environment for me to apply my theoretical knowledge and practical skills to real-world scenarios. Through my engagement with these labs, I have been able to deepen my understanding of cybersecurity concepts, gain hands-on experience in identifying and exploiting vulnerabilities, and develop strategies for effective threat mitigation.


OSCP Prep

Total labs : 104


VulnHub

Infosec Prep: OSCP : Simple introductory machine

GreenOptic: 1 : LFI exploit , Network and Wireshark machine

Corrosion: 1 : LFI and log poisoning exploit

billu: b0x : Local file read & phpmy exploit

RickdiculouslyEasy :1 : Command Injection & sudo exploit

So Simple : 1 : WordPress vulnerability exploit

PNPT Academy : CMS exploit

PNPT : Dev : Boltwire exploit

PNPT : Black Pearl : dnsrecon & Navigate CMS exploit

Dina: 1.0.1 : playsms machine

ICMP: 1 : Monitorr & Hping3 exploit

Dripping Blues: 1 : Polkit exploit

FristiLeaks: 1.3 : Decryption & SUID exploit

My CMSMS: 1 : CMS MS exploit

W34kn3ss: 1 : OpenSSL exploit

Bob: 1.0.1 : webshell command injection bypass

Pwned: 1 : Directory enumeration & docker exploit

HA: Wordy : WordPress command injection and SUID exploit

Funbox: 1 : WordPress & Cronjob exploit

Vegeta: 1 : Steganography based box

Djinn : 1 : Command Injection bypass & sudo exploit

PwnLab: init : Upload bypass and binary exploit

Inclusiveness : 1 : LFI exploit

Cybersploit : 1 : Decryption and outdated kernel machine

EVM: 1 : Simple wordpress exploit

Photographer : 1 : Koken CMS exploit

BBS (cute): 1.0.2 : CuteNews exploit

Kioptrix 1 : apache mod_ssl and samba 2.2 exploits

Born2Root: 1 : cronjob and bruteforce exploit

DC: 1 : Drupal exploit box

DC:2 : WordPress box

DC: 3.2 : Joomla! and Linux kernel exploit

DC: 4 : Burpsuite bruteforce, command injection and tee exploit

DriftingBlues:6 : Textpattern and Dirtycow exploit

Evilbox : Website parameter and write permissions exploits

Potato : PHP Type Juggling & LFI machine

Lampiao : 1 : Drupal & Linux Kernel 2.6.22 < 3.9 – ‘Dirty COW exploit

Funbox: Scriptkiddie : ProFTPd exploit

Funbox : Easy : Web exploit machine

Funbox : Rookie : FTP exploit machine

Funbox : EasyEnum : Enumeration machine

Sunset: Midnight : WordPress & SUID exploit

Sunset : Noontide : Unreal IRC exploit

Sunset : Dawn : SMB enumeration & cronjob exploit

Sunset : Decoy : chrootkit exploit

Sumo : 1 : Shellshock and Dirty Cow exploit

Gaara : Thorough enumeration and decryption box

Cybersploit 1 : Ubuntu 12.04.5 exploit

HACLABS: NO_NAME CTF : Command injection vulnerability

Quaoar : Hackfest 2016 CTF

Deathnote : Straight forward box

Ripper 1 : Web application testing & enumeration

Tophatsec Freshly : Find the secret hidden in a sensitive file

Mercury : SQLmap

c0ldBox : WordPress machine

Jagnow 1.0.1 : Enumeration

FUNBOX: LUNCHBREAKER CTF : Machine using bruteforce

Pentester Lab: From SQL injection to Shell

Lin.Security:1 NFS exploit

Driftingblues : EyesOfNetwork exploit

Basic Pentesting:1

HackTheBox

Bashed : scriptmanager exploit

Netmon : PRTG RCE exploit

Armageddon : Drupal exploit

Sauna : Active Directory DCSync attack

Active : Easy Active directory machine

Nibbles : Nibbleblog exploit

Forest : Active Directory exploit

Previse : Web intercept exploit

Artic : Coldbox fusion exploit

Shocker : Shellshock exploit

Blocky : Password reuse exploit

Knife : PHP RCE

Sense : Pfsense webserver exploit

Irked : IRC exploit

Buff : Exploit using port forwarding

Mirai : IoT exploit

Networked : File Image exploit

Valentine : Heartbleed exploit

Devel : Windows RCE exploit

Beep : LFI enumeration and webmin exploit

Timelapse : Exploiting using SMB and LAPS

Tier 0 : Starting Point Machine

Tier 1 : Starting Point Machine

Optimum : Windows 2012 R2 Server exploit

Return : Windows Printer service exploit

Jerry : Apache tomcat code execution exploit

Blue : Eternal Blue SMB exploit

Lame : Samba Username map script

Cap : Wireshark recon

Granny : IIS 6.0 Vulnerability code execution

Legacy : MS08-067 exploit

Grandpa : IIS 6.0 Vulnerability code execution




TryHackMe

Mr Robot : Based on the Mr. Robot show

GamingServer : Boot2Root box for beginners

Startup : Abuse traditional vulnerabilities via untraditional means

Gallery : Exploit our image gallery system

Fowsniff : Boot2Root machine

Tomghost : Identify recent vulnerabilities to try exploit the system

Lian yu : Arrowverse themed beginner CTF

Pickle Rick : Exploit a webserver

Simple : Beginner level ctf

Attacktive Directory : Active Directory