Hello friends! Today we are going to take another CTF challenge known as Kioptrix: Level1.2 (#3) and it is another boot2root challenge provided for practice and its security level is for the beginners. So let’s try to break through it. But before please note that you can download it from here https://download.vulnhub.com/kioptrix/KVM3.rar Penetrating Methodologies (Method […]
Hack the De-ICE: S1.120 VM (Boot to Root)
Hello friends! Today we are going to take another CTF challenge known as De-ICE: S1.120 and it is another boot2root challenge provided for practice and its security level is for the beginners. So let’s try to break through it. But before please note that you can download it from here https://www.vulnhub.com/entry/de-ice-s1120,10/ Penetrating Methodologies Network Scanning […]
Hack the pWnOS-1.0 (Boot To Root)
Today we are going to solve another CTF challenge “pWnOS-1.0” of the vulnhub labs. The level of this challenge is not so tough and its difficulty level is described as beginner/intermediate. You can download it from here https://www.vulnhub.com/entry/pwnos-10,33/ Vulnerabilities: Arbitrary File Disclosure Privilege Escalation Weak Credentials Penetrating Methodologies: Network Scanning (Nmap) Exploiting web application (Metasploit) […]
Hack the pWnOS: 2.0 (Boot 2 Root Challenge)
Hello friends!! Today we are going to solve a fun CTF challenge named “pWnOS: 2.0” presented on Vulnhub for practicing Penetration Testing by pWnOS. This virtual machine is having intermediate to the medium difficulty level. You can download the Lab from here. Initial Configuration of Lab: Configure your attacking platform to be within the 10.10.10.0/24 network […]
Hack the De-ICE: S1.140 (Boot to Root)
Hello friends!! Today we are going to solve De-ICE: S1.140 CTF challenge presented by vulnhub for penetration practice. This lab is proposal for OSCP practice and mode of difficulty level is medium. You can download it from this Link: https://www.vulnhub.com/entry/de-ice-s1140,57/ Penetrating Methodlogies: Network Scaning (Nmap) HTTP Directory brute-force (Dirb) Obtain Auth log HTTPS Directory brute-force […]
Hack the De-Ice S1.130 (Boot2Root Challenge)
Hello and welcome readers to another CTF challenge De-ice s1.130. This is the third installment in the series of vulnerable machines in de-ice series. You can download de-ice from the official vulnhub repository here. The aim of this challenge is to get root and read the congratulatory flag. Difficulty Level: Intermediate A new penetration tester […]
Hack the Holynix: v1 (Boot 2 Root Challenge)
Hello friends! Today we are going to take another CTF challenge known as Holynix 1 and it is another boot2root challenge provided for practice and its security level is for the beginners. So let’s try to break through it. But before please note that you can download it from here https://www.vulnhub.com/entry/holynix-v1,20/ Penetrating Methodologies Network Scanning […]
Xerxes: 1 Vulnhub Walkthrough
Welcome to another boot2root CTF challenge “Xerxes: 1” uploaded by bas on vulnhub. As, there is a theme, and you will need to snag the flag in order to complete the challenge and you can download it from the given below link: https://download.vulnhub.com/xerxes/xerxes.tar.gz By author, it has a good variety of techniques needed to get […]
Hack the LAMPSecurity: CTF8 (CTF Challenge)
Welcome to another boot2root CTF challenge “LAMPSecurity: CTF8” uploaded by madirsh2600 on vulnhub. As, there is a theme, and you will need to snag the flag in order to complete the challenge and you can download it from https://www.vulnhub.com/entry/lampsecurity-ctf8,87/ By author, it has a good variety of techniques needed to get root – no exploit […]
Hack the LAMPSecurity: CTF 5 (CTF Challenge)
Hello friends! Today we are going to take another CTF challenge known as LAMPSecurity CTF5 and it is another boot2root challenge provided for practice and its security level is for the beginners. So let’s try to break through it. But before please note that you can download it from here https://www.vulnhub.com/entry/lampsecurity-ctf5,84/ Penetrating Methodologies Network Scanning […]