赞
踩
名称 | 发布日期 | 作者名称 | 系列 | 镜像大小 | 下载地址 | 描述1 | 描述2 | MD5 | SHA1 | 虚拟机格式 | 操作系统 | DHCP服务 | IP地址 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
The Pentesters: 64-Bit AppSec Primer (Beta) | 1 Jul 2016 | Austin Wile | The Pentesters | 1.3 GB | https://download.vulnhub.com/64bitprimer/64bitprimer.ova | Here at The Pentesters, we have a passion for application security and all that goes with it. We think that application security is an extremely important part of the field of information security and have, “made it our business” so to speak to provide a means of education into modern-day application security. With modern computing becoming more and more advanced, and the requirements for understanding the functionality and security behind said computing becoming equally as challenging to understand, we figured that perhaps giving a set of challenges dedicated to learning the mere basics of 64 bit appsec would be beneficial to the security community. | The 64-Bit AppSec Primer consists of 16 challenges, increasingly more difficult than the previous one, dedicated to learning the basics of 64 bit binary exploitation and reverse engineering. The x64 instruction set, as you would expect, has many new instructions, registers, and calling conventions in comparison to the traditional x86 instruction set. Our goal, with this challenge, is to get you inside a debugger with intentionally vulnerable binaries, and get you looking at the inner-workings of a 64 bit binary. Alongside the increasing complexity of the instruction set, is an equally complexity of exploitation, which as a penetration tester and security engineer, will prove useful to understand. The challenges consist of varying vulnerabilities and anti-debugger tricks in binaries, such as: As a bonus, we would like to contribute back to the security community. We are donating the VM to Vulnhub, for all to have, and we are also offering prizes to three people who gives us the most robust and complete write-up for the challenges. In order to qualify for the prizes, you must post your write-up on either your personal blog, or website (your choice), and post a link to http://thepentesters.net/challenge/ along with your username. If you are unable to solve all of the challenges, that is okay, we will still accept your write-up for judging, we still want to see what you completed and how you did it. Here are the prizes: The challenge ends on August 31st, 2016. All write-ups must be submitted by then, whoever has written the best write-up with the most detailed explanations wins. The judging will be done by our pentesting team. Also, I would like to note a couple rules for the reverse engineering challenges. There are a couple challenges that don’t have “flags” but you will know when you have solved those, please note your findings and take screen-shots of them as well. As for the VM, you are to ssh in as user n00b and password n00b where you will find gdb-peda installed for you to make your life easier. The VM gets its IP through DHCP and is set to host-only adapter in VMware, so it should work for you straight out of the box so to speak. That is all I have for you and I hope you enjoy. | A61B36DAA7ADBCF57E8DD499E82695CB | 26E74509F7C869BB146727BEE85782D3243328F9 | Virtual Machine (Virtualbox - OVA) | Linux | Enabled | Automatically assign |
PwnLab: init | 1 Aug 2016 | Claor | PwnLab | 785 MB | https://download.vulnhub.com/pwnlab/pwnlab_init.ova | Wellcome to “PwnLab: init”, my first Boot2Root virtual machine. Meant to be easy, I hope you enjoy it and maybe learn something. The purpose of this CTF is to get root and read de flag. | Can contact me at: or on Twitter: @Chronicoder | CE8AB26DE76E5883E67D6DE04C0F6E43 | 575F19216A3FA3E377EFE69D5BF715913F294A3B | Virtual Machine (Virtualbox - OVA) | Linux | Enabled | Automatically assign |
Mr-Robot: 1 | 28 Jun 2016 | Leon Johnson | Mr-Robot | 704MB | https://download.vulnhub.com/mrrobot/mrRobot.ova | Based on the show, Mr. Robot. | This VM has three keys hidden in different locations. Your goal is to find all three. Each key is progressively difficult to find. The VM isn’t too difficult. There isn’t any advanced exploitation or reverse engineering. The level is considered beginner-intermediate. | BC02C42815EAC4E872D753E1FD12DDC8 | DC0EB84DA4C62284C688590EE092868CE84A09AB | Virtual Machine (Virtualbox - OVA) | Linux | Enabled | Automatically assign |
6Days Lab: 1.1 | 25 Jul 2016 | CanYouPwn.Me | 6Days Lab | 682 MB | https://download.vulnhub.com/6daylab/6Days_Lab-v1.0.1.ova | Boot2root machine for educational purposes | Our first boot2root machine, execute /flag to complete the game. Try your skills against an environment protected by IDS and sandboxes! “Our product Rashomon IPS is so good, even we use it!” they claim. Hope you enjoy. v1.0 - 2016-07-12 v1.1 - 2016-07-25 | 98DE1E26447B2BFF260DF10441225820 | C56F6774F51A22571E6F0D7033639AC86DC822C0 | Virtual Machine (Virtualbox - OVA) | Linux | Enabled | Automatically assign |
Breach: 2.1 | 15 Aug 2016 | mrb3n | Breach | 1.3 GB | https://download.vulnhub.com/breach/Breach-2_final2.1.zip | Second in a multi-part series, Breach 2.0 is a boot2root/CTF challenge which attempts to showcase a real-world scenario, with plenty of twists and trolls along the way. | The VM is configured with a static IP (192.168.110.151) so you’ll need to configure your host only adaptor to this subnet. Sorry! Last one with a static IP 声明:本文内容由网友自发贡献,版权归原作者所有,本站不承担相应法律责任。如您发现有侵权的内容,请联系我们。转载请注明出处:【wpsshop博客】 推荐阅读 相关标签 Copyright © 2003-2013 www.wpsshop.cn 版权所有,并保留所有权利。 |