Tag: linux (36)
Getting Started With Kernel Exploitation
This is my first time setting up QEMU, debugging kernel with GDB, and exploiting kernel modules for privilege escalation and...
Reproducing Nimbuspwn: Linux Privilege Escalation via Path Traversal and TOCTOU in networkd-dispatcher
A technical walkthrough of reproducing Nimbuspwn (CVE-2022-29799 and CVE-2022-29800), privilege escalation vulnerabilities in networkd-dispatcher exploiting path traversal and TOCTOU race...
Reproducing CVE-2020-8831: Privilege Escalation via Symlink Attack on Apport's Lock File Implementation
CVE-2020-8831 is a vulnerability where an attacker can create a symlink at /var/lock/apport, redirecting Apport's lock file location and leading...
Footprinting Lab
Rabbit Hole
It's easy to fall into rabbit holes.
TryHack3M: Subscribe
Can you help Hack3M reach 3M subscribers?
File Transfers Cheatsheet
Các kỹ thuật truyền tải file đến và từ máy mục tiêu (Windows & Linux)
Year of the Pig
Some pigs do fly...
Year of the Fox
Don't underestimate the sly old fox...
Year of the Rabbit
Time to enter the warren...
Year of the Dog
Always so polite...
Year of the Jellyfish
Some boxes sting...
Silver Platter
Can you breach the server?
Zeno
Do you have the same patience as the great stoic philosopher Zeno? Try it out!
CMesS
Can you root this Gila CMS box?
tomghost
Identify recent vulnerabilities to try exploit the system or read files that you should not have access to.
Thompson
boot2root machine for FIT and bsides guatemala CTF.
GoldenEye
Bond, James Bond. A guided CTF.
dogcat
I made a website where you can look at pictures of dogs and/or cats! Exploit a PHP application via LFI...
Internal
Penetration Testing Challenge.
Daily Bugle
Compromise a Joomla CMS account via SQLi, practise cracking hashes and escalate your privileges by taking advantage of yum.
Skynet
A vulnerable Terminator themed Linux machine.
Game Zone
Learn to hack into this machine. Understand how to use SQLMap, crack some passwords, reveal services using a reverse SSH...
Nibbles
Nibbles is a fairly simple machine, however with the inclusion of a login blacklist, it is a fair bit more...
Kenobi
Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges...
UltraTech
The basics of Penetration Testing, Enumeration, Privilege Escalation and WebApp testing.
Cheese CTF
Inspired by the great cheese talk of THM!
0day
Exploit Ubuntu, like a Turtle in a Hurricane.
Wonderland
Fall down the rabbit hole and enter wonderland.
TryHack3M: Bricks Heist
Crack the code, command the exploit! Dive into the heart of the system with just an RCE CVE as your...
Smol
Test your enumeration skills on this boot-to-root machine.
Basic Pentesting
This is a machine that allows you to practise web app hacking and privilege escalation.