Category: Easy

Temple of Doom: 1 Boot to Root VM Walkthrough

Introduction Today we’re going to thoroughly pwn the Temple of Doom: 1 VM from Vulnhub, created by 0katz. This box was fun and had some swish ASCII art to boot, I learned a tonne from it and I hope that you learn something from this write up! Let’s get to it.

Bob: 1.0.1 Boot to Root VM Walkthrough

Introduction Apologies again for the hiatus between write-ups, life got busy again and I had to do some preparation for my SANS security course next month (!!!!) Today we’ll be pwning the BoB 1.0.1 VM from Vulnhub, created by c0rruptedb1t! Let’s get to it =]

Jordan Infosec CTF 1 Boot to Root VM Walkthrough

Introduction Sorry for the long delay in posting – life got a little busy over the past month or two. Today I’ll be posting my write up of how to compromise the excellent Jordan Infosec CTF 1 VM created by @Banyrock This VM is more at the CTF end of the spectrum than a traditional Boot

Vulnhub: PwnLab: Init Boot2Root VM

Introduction Today I’ll be compromising the PwnLab: Init VM created by @Chronicoder and hosted with love by vulnhub.com Astute / psychic readers will have spotted that I’ve been following this list of VMs recently, as I’m working my way towards attempting the PWK / OSCP. Once this VM is done I’ll move on to the

Vulnhub: Stapler 1 Boot2Root VM

  Introduction Today I’ll be documenting the process I followed to compromise the Stapler 1 vulnerable VM created by g0tmi1k and hosted with love by Vulnhub Really, really enjoyed this box! Lots of fun twists, and I really loved the shenanigans on port 666 🙂 Port Scanning As usual, we kick off with a TCP port scan

Vulnhub: Fristileaks 1.3 Boot2Root VM

  Introduction This box is widely touted as being a good “OSCP prep” box, at the easier end of the difficulty spectrum. This blog post will detail how to achieve full compromise on the VM.   Note to the reader – I had a horrible time getting this to play nice with VirtualBox’s DHCP server,

Vulnhub: Kioptrix #4 Boot2Root VM

  Introduction Today I’ll be demonstrating how to compromise the fourth box in the Kioptrix series. This was the first box which stretched me as a fledgling penetration tester, escaping restricted shells and escalating privilege without using a magical Kernel exploit! (because I was too lazy to install missing libraries in Kali so I could

Vulnhub: Kioptrix #3 Boot2Root VM

  Introduction Today I’ll be demonstrating how to compromise the third box in the Kioptrix series. Really enjoyed this box, had a nice twist which requires some knowledge of how sudo works on Linux and how simple misconfigurations can create holes in systems. It’s worth noting that there are lots of ways to exploit this

Vulnhub: Kioptrix #2 Boot2Root VM

    Introduction As part of my series of blogs detailing how to compromise the Kioptrix series of boot2root challenges, today I’ll be documenting one method of compromising the second box. NMap Similar to box #1, in terms of available ports – SSH HTTP RPC HTTPS CUPS (interesting..!) RPC Status MySQL Analysis This box isn’t

Vulnhub: Kioptrix #1 Boot2Root VM

  Introduction Over the next 5 blog posts I intend to write up how to fully compromise the famous Kioptrix series of Boot 2 Root VMs. This post will detail the compromise of the first VM in the series, Kioptrix Level 1. As mentioned in the banner above, there are numerous ways to compromise this