Ragnar Lothbrok: 1
Google && Wikipedia Is Your FriendDifficulty: easy"how the little pigs will scream when they know how the boar suffered"Twitter: @ArmBjornWork in Virtualbox.Get root permissionsVulnHub
View ArticleSchool: 1
Machine name: SchoolLevel: Easyflags: user, rootDescription: This is a Linux box, running a Web Application, and a Windows application in WINE environment to give Access to Wine from Linux.Author:...
View ArticleNetstart: 1
Machine name: NetstartLevel: Easyflags: user, rootDescription: This is a Linux box, running a WINE Application vulnerable to Buffer Overflow, escalation is pretty simpleAuthor: foxloxAbout VM:...
View ArticleCallme: 1
Machine name: CallmeLevel: Easyflags: user, rootDescription: This is a Linux box with a custom remote accessAuthor: foxloxAbout VM: VirtualBox ready, the adapter is currently Bridged, DHCP activeYou...
View ArticleLinESC: 1
LinEsc is a machine built to demonstrate the 7 most common ways of Linux privilege escalation. Target: get root privileges with 7 different ways.Default credentials : (muhammad:nasef)VulnHub
View ArticleINO: 1.0.1
Level: Easyflags: user, rootDescription: This machine require a low skill to get user flag, a little more skill to escalate to root!Author: foxloxAbout VM: VirtualBox ready, the adapter is currently...
View ArticleInferno: 1.1
Users: 2Difficulty Level: Easy/MediumReal Life machine vs CTF.Midway upon the journey of our life I found myself within a forest dark, For the straightforward pathway had been lost. Ah me! how hard a...
View ArticleCybox: 1.1
Will you be able to compromise the internal server of the CYBOX company?Difficulty: MediumObjective: Get user.txt and root.txtThis works better with VirtualBox rather than VMware.Contact:...
View Articlehackme: 2
'hackme2' is a medium difficulty level box. This is the second part of the hackme series where more controls are in place do deter malicious attacks. In addition, you will have to think out of the box...
View ArticleOdin: 1
Difficulty: Easy Odin ventured to the Well of Mimir, near Jötunheim, the land of the giants in the guise of a walker named Vegtam. MÃmir, who guarded the well, to allow him to drink from it, asked him...
View ArticleDevGuru: 1
DevGuru is a fictional web development company hiring you for a pentest assessment. You have been tasked with finding vulnerabilities on their corporate website and obtaining root.OSCP like ~ Real life...
View ArticleJetty: 1
The company Aquarium Life S.L. has contacted you to perform a pentest against one of their machines. They suspect that one of their employees has been committing fraud selling fake tickets. They want...
View ArticleChill Hack: 1
Difficulty: Easy/IntermediateFlag: 2 (User and root)Hint: EnumerationChill Hack is a simple machine which provides common and real world vulnerabilities (tested on VMware Workstation 15).Make sure not...
View ArticleBlueSky: 1
Difficulty: EasyGoal: Get the root shell i.e.(root@localhost:~#) and then obtain flag under /root).Information: Your feedback is appreciated - Email: suncsr.challenges@gmail.comTested: VMware...
View ArticleDriftingBlues: 1
get flagsdifficulty: easyabout vm: tested and exported from virtualbox. dhcp and nested vtx/amdv enabled. you can contact me by email (it should be on my profile) for troubleshooting or questions.VulnHub
View ArticleWho Wants To Be King: 2
Power is dangerous, attracts the worst, corrupts the bestDo not give upDifficulty: easy to intermediatepls add /etc/hosts ip + armbjornTwitter: @ArmBjornWork in Virtualbox.Get root permissionsVulnHub
View ArticleThe Office: Doomsday Device
DifficultyEasyDetailsIt's a very simple, beginner level, "The Office" themed CTF machine. Created and tested with VirtualBox. This box will assign itself an IP address through DHCP. You shouldn't have...
View ArticleShuriken: Node
Difficulty: easy/mediumAfter the last breach, The Shuriken Company decided to move and rebuild its infrastructure. This time using different technology, and assuring us it's gonna be secure. Will it be...
View Article