Penetration Testing in SMB Protocol

In Hacking, Ports and Protocols play a major role as hacking is not possible without them. And to work with them, let us first understand ports and protocols. In information technology, a protocol is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols specify interactions between the […]

Hack the Billy Madison VM (CTF Challenge)

Today in our CTF challenges we are going to do Billy Madison. This VM is based on 90’s movie Billy Madison, hence the name of the VM. The main aim of this VM is to figure out how Eric took over the machine and then undo his changes so you can recover Billy’s 12th grade […]

Hack the Hackday Albania VM (CTF Challenge)

This was used in HackDay Albania’s 2016 CTF. It uses DHCP. Note: VMware users may have issues with the network interface doing down by default. You are recommended to use Virtualbox.  Download the lab from:,167/  Let’s begin. First we run netdiscover(as usual). netdiscover Next we run nmapnmap -p- A Nmap result shows that our […]

Hack the Freshly VM (CTF Challenge)

Here we come with a new article which will all be about a penetration testing challenge called FRESHLY. The goal of this challenge is to break into the machine via the web and find the secret hidden in a sensitive file. It’s an easy lab… let’s get started with it and access it.Download from here […]

Hack the Fortress VM (CTF Challenge)

Previously you have breach many vulnhub CTF, today we will try to breach FORTRESS VULNHUB CTF. Download it from here. Start Kali Linux and follow  these steps. Open terminal in Kali Linux and run this command.NetdiscoverThis command will scan your network and give you victim IP: scan particular IP with aggressive scan using Nmap tool […]

Hack the Zorz VM (CTF Challenge)

Zorz is another VM that will challenge your webapp skills. There are 3 separate challenges (web pages) on this machine. It should be pretty straight forward.  This machine will probably test your web app skills once again. There are 3 different pages that should be focused on(you will see). Your goal is to successfully upload […]

Hack the Padding Oracle Lab

The main purpose to solve this lab was to share the padding oracle attack technique with our visitorsThe padding oracle attack enables an attacker to decrypt encrypted data without knowledge of the encryption key and used cipher by sending skillful manipulated cipher texts to the padding oracle and observing of the results returned by it. […]

Hack the Pentester Lab: from SQL injection to Shell VM

Today we are going to perform penetration testing in another lab, download it from here. Now install the iso image in VM ware and start it. The task given in this lab is to gain access of administration console and upload PHP webshell.Start your Kali Linux then open the terminal and type netdiscover command for […]