Other articles

  1. PwnLab

    Sun 28 August 2016

    This is a PwnLab:init challenge from vulnhub.com. You can obtain the virtual machine from: here

    ''' The target is flag: /root/flag.txt '''

    Target machine discovery:

    This is what we've got when browse the web server:

    Nikto scan on the target web server:

    At this point i search ...

    read more
  2. Stapler

    Wed 10 August 2016

    This is a Stapler challenge from vulnhub.com. You can obtain the virtual machine from: here

    ''' The primary object is to got root. '''

    Our nmap scan:

    After running nmap script scan with -A switch:

    nmap -A -T4 -p- 10.0.0.142
    
    • Ftp Anon login allowed

    Base on what we ...

    read more
  3. TommyBoy1

    Fri 29 July 2016

    This is a TommyBoy1 challenge from vulnhub.com. You can obtain the virtual machine from: here

    ''' The primary objective is to restore a backup copy of the homepage to Callahan Auto's server. However, to consider the box fully pwned, you'll need to collect 5 flags strewn about the ...

    read more
  4. Necromancer

    Thu 14 July 2016

    This is a Necromancer challenge from vulnhub.com. You can obtain the virtual machine from: here

    Day1

    We found our target with:

    netdiscover -r 10.0.0.1/24
    

    As usual scan the target:

    nmap -sS -T5 -Pn -n 10.0.0.137
    

    Didn't find anything so lets look ...

    read more
  5. Mr Robot CTF

    Wed 13 July 2016

    This is a Mr.Robot challenge from vulnhub.com. You can obtain the virtual machine from: here

    First lets find the target in our network:

    netdiscover target

    Our target machine is 10.0.0.135, lets run nmap scan on it:

    nmap scan target

    Nothing interesting just web server, and close ssh port 22. Browse ...

    read more

Page 1 / 1

blogroll

social