Vaishali Kumari's Projects
This is a small boot2root VM I created for my universityâs cyber security group. It contains multiple remote vulnerabilities and multiple privilege escalation vectors. I did all of my testing for this VM on VirtualBox, so thatâs the recommended platform. I have been informed that it also works with VMware, but I havenât tested this personally. This VM is specifically intended for newcomers to penetration testing. If youâre a beginner, you should hopefully find the difficulty of the VM to be just right. Your goal is to remotely attack the VM and gain root privileges. Once youâve finished, try to find other vectors you might have missed! If you enjoyed the VM or have questions, feel free to contact me at: [email protected] If you finished the VM, please also consider posting a writeup! Writeups help you internalize what you worked on and help anyone else who might be struggling or wants to see someone elseâs process. I look forward to reading them!
This is a boot2root VM and is a continuation of the Basic Pentesting series. This series is designed to help newcomers to penetration testing develop pentesting skills and have fun exploring part of the offensive side of security. VirtualBox is the recommended platform for this challenge (though it should also work with VMware -- however, I havenât tested that). This VM is a moderate step up in difficulty from the first entry in this series. If youâve solved the first entry and have tried a few other beginner-oriented challenges, this VM should be a good next step. Once again, this challenge contains multiple initial exploitation vectors and privilege escalation vulnerabilities. Your goal is to remotely attack the VM, gain root privileges, and read the flag located at /root/flag.txt. Once youâve finished, try to find other vectors you might have missed! If youâd like to send me a link to your writeup, enjoyed the VM or have questions or feedback, feel free to contact me at: [email protected] If you finished the VM, please also consider posting a writeup! Writeups help you internalize what you worked on and help anyone else who might be struggling or wants to see someone elseâs process. There were lots of wonderful writeups for Basic Pentesting: 1, and I look forward to reading the writeups for this challenge.
simple text based battle game using python
HacktheBox machine Writeup.
Free Online Books
Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
There is a company that seems unreliable. You must think like a hacker and hack it easily. I think you do not need a hint but here are the nudges for you. For the user, you should understand how it works` and manipulate it. You might need everything that youâll find. For root, wait a minute.
ColddBox Easy, it is a Wordpress machine with an easy level of difficulty, highly recommended for beginners in the field.
đŻ CSV Injection Payloads
Here is Walkthrough of another boot2root challenge called âCyberSploit: 1â. Itâs available at Vulnhub for penetration testing. This is an easy level lab. The credit for making this lab goes to cybersploit1. Letâs get started and learn how to successfully break it down. Level: Easy
DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing. It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn.
DC-2 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing. It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn. To successfully complete this challenge, you will require Linux skills, familiarity with the Linux command line and experience with basic penetration testing tools, such as the tools that can be found on Kali Linux, or Parrot Security OS.
DC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing. As with the previous DC releases, this one is designed with beginners in mind, although this time around, there is only one flag, one entry point and no clues at all.
The official Exploit Database repository
A small VM made for a Dutch informal hacker meetup called Fristileaks. Meant to be broken in a few hours without requiring debuggers, reverse engineering, etc.. Name: Fristileaks 1.3 Author: Ar0xA Series: Fristileaks Style: Enumeration/Follow the breadcrumbs Goal: get root (uid 0) and read the flag file Tester(s): dqi, barrebas Difficulty: Basic
Boot2Root ! This is a reallife szenario, but easy going. You have to enumerate and understand the szenario to get the root-flag in round about 20min.
This is walkthrough of another Boot2Root Vulnhub machine ! This can be a real life scenario if rockies becomes admins. Easy going in round about 15 mins.
Here is a walk through for ISRO Vulnhub Machine. It was created by Hacking Articles to give tribute to the Indian Space Research Organisation (ISRO).
CTF machine Writeup
Be the investigator to finish this machine,Its for only beginners, Share your Screen shot on telegram group, Group link will be in flag. Author: Sivanesh Kumar
Dex to Java decompiler
A collection of curated Java Deserialization Exploits
Vulnhub CTF writeup
Hack The Box machine - LAME Walkthrough
This is a beginner boot2root challenge. This is a VMware machine. DHCP is enabled, add lemonsqueezy to your hosts. Itâs easypeasy! Difficulty level: Beginner to intermediate Author: James Hay
This is another Boot2Root challenge prepared by KoocSec. It is based on the concepts of great novel-turned-movie The Lord Of The Ring.
This is walkthrough of vulnhub CTF Me and My girlfriend. Difficulty Level: Beginner
A simple MusicPlayer android application using Android Studio.