CTF TR0LL: 2 Walkthrough The next machine in the Tr0ll series of VMs. This one is a step up in difficulty from the original Tr0ll but the time required to solve is…
CTF TR0LL: 1 Walkthrough Tr0ll was inspired by the constant trolling of the machines within the OSCP labs. The goal is simple, gain root and get Proof.txt from the…
CTF PINKY’S PALACE: V2 Walkthrough Description: A realistic Boot2Root. Gain access to the system and read the /root/root.txt.
CTF PWNLAB: INIT Walkthrough Wellcome to “PwnLab: init”, my first Boot2Root virtual machine. Meant to be easy, I hope you enjoy it and maybe learn something. The…
CTF PWNOS: 2.0 (PRE-RELEASE) Walkthrough pWnOS v2.0 is a Virutal Machine Image which hosts a server to pratice penetration testing. It will test your ability to exploit the server…
CTF HACKLAB: VULNIX Walkthrough Here we have a vulnerable Linux host with configuration weaknesses rather than purposely vulnerable software versions (well at the time of…
CTF SickOs: 1.2 Walkthrough “So in war, the way is to avoid what is strong, and strike at what is weak.” ― Sun Tzu, The Art of War
CTF FRISTILEAKS: 1.3 Walkthrough 📌 VMware users will need to manually edit the VM's MAC address to: 08:00:27:A5:A6:76
CTF KIOPTRIX: 2014 (#5) Walkthrough As usual, this vulnerable machine is targeted at the beginners. It’s not meant for seasoned pentesters or security geeks who have been at…
CTF KIOPTRIX: LEVEL 1.3 (#4) Walkthrough This is similar to the past kioptrix series. Similarly, this is best for beginners. As usual, let me start with a beautiful quote.
CTF KIOPTRIX: LEVEL 1.2 (#3) walkthrough This challenge is geared towards the beginner. It is however different from the past Kioptrix machines. Author has added a few more steps…
CTF KIOPTRIX: LEVEL 1.1 (#2) walkthrough The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player 😜). The purpose…
CTF Kioptrix: Level 1 (#1) walkthrough The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player). The purpose of…