Hacker Fest: 2019 Vulnhub Walkthrough

October 12, 2019

Hacker Fest:2019 VM is made by Martin Haller. This VM is a purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing. It is of easy level and is very handy in order to brush up your skills as a penetration tester. The ultimate goal of this challenge is to get root and to read the root flag. Level: Easy Since these labs are…

Read More >>

Lxd Privilege Escalation

October 12, 2019

In this post we are going to describes how an account on the system that is a member of the lxd group is able to escalate the root privilege by exploiting the features of LXD. A member of the local lxd group can instantly escalate the privileges to root on the host operating system. This is irrespective of whether that user has been granted sudo rights and does not require…

Read More >>

bossplayersCTF 1: Vulnhub Walkthrough

October 9, 2019

bossplayersCTF 1 VM is made by Cuong Nguyen. This VM is a purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing. It is of intermediate level and is very handy in order to brush up your skills as a penetration tester. The ultimate goal of this challenge is to get root and to read the root flag. Level: Intermediate Since these labs are…

Read More >>

Web Application Lab Setup on Windows

October 8, 2019

Hello friends! Today we are going to show you how you can set up a vulnerable web application server in a Windows system using Xampp. Here we will be configuring the most popular web applications (DVWA, bwapp, SQLI, Mutillidae). So, let’s do that. Table of Content Requirement Web application Xampp Server Installation in Windows DVWA bWAPP Sqli Mutillidae Requirement-Xampp server (Windows-X64) Web Application A web application is a computer program…

Read More >>

HA: Armour Walkthrough

October 6, 2019

This is our Walkthrough for “HA: Armour” and this CTF is designed by Hacking Articles Team 😊, hope you will enjoy this. TASK: Klaw has stolen some armours from the Avengers Super-Secret Base. Falcon has checked the manifest, the following things are unaccountable: HulkBuster Armour Spiderman Armour Ant-Man Armour Black Panther Armour Iron Man Armour Klaw hides all these armours and now it’s up to you. Can you use your…

Read More >>

WordPress: Reverse Shell

September 28, 2019

This post is related to WordPress security testing to identify what will be possible procedure to exploit WordPress by compromising admin console. We have already setup WordPress in our local machine but if you want to learn WordPress installation and configuration then visit the link given below. https://www.hackingarticles.in/wordpress-penetration-testing-lab-setup-in-ubuntu/ As we all know wpscan is a standalone tool for identifying vulnerable plugins and themes of WordPress, but in this post, we…

Read More >>

Web Shells Penetration Testing

September 25, 2019

This post will describe the various PHP web Shell uploading technique to take unauthorized access of the webserver by injecting a malicious piece of code that are written in PHP. Table of Content Introduction of PHP Web shells Inbuilt Kali’s web shells simple backdoor.php qsd-php backdoor web shell php-reverse-shell.php Using MSF venom Weevely php web shell PHP_bash web shell Requirements Attacker: Kali Linux Target: Web for Pentester, DVWA Introduction of…

Read More >>

Hack the Box Challenge: Baniston Walkthrough

September 24, 2019

Today we are going to solve another CTF challenge called “Baniston” which is categorized as a retired lab developed by Hack the Box for the purpose of online penetration practices. Solving this lab is not that tough if have proper basic knowledge of Penetration testing. Let’s start and learn how to breach it. Level: Intermediate Task: find user.txt and root.txt file on the victim’s machine. Penetration Testing Methodology Network Scanning…

Read More >>

DC8: Vulnhub Walkthrough

September 21, 2019

DC8 VM is made by DCAU. This VM is a purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing. It is of intermediate level and is very handy in order to brush up your skills as a penetration tester. The ultimate goal of this challenge is to bypass two-factor authentication, get root and to read a flag. Level: Intermediate Since these labs are…

Read More >>

HA: Infinity Stones Vulnhub Walkthrough

September 20, 2019

Today we are going to solve our CTF challenge called “HA: Infinity Stones” We have developed this lab for the purpose of online penetration practices. Solving this lab is not that tough if have proper basic knowledge of Penetration testing. Let’s start and learn how to breach it. Download Here Level: Intermediate Task: Find 6 Flags on the victim’s machine. Walkthrough Firsts of all we try to identify our target…

Read More >>