-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathfile_output
3 lines (2 loc) · 11.9 KB
/
file_output
1
2
3
NetSecFocus Trophy Room - Google DriveNetSecFocus Trophy RoomVulnHubProving Grounds PlayProving Grounds PracticeHackTheBox Coming Soon ;)Vulnhub/Hackthebox OSWEABC1Vulnhub VM LIST: Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam.DO NOT REQUEST EDIT ACCESS. Save a copy instead. Do not forget to check the other tabs in this list below!: 2Curated by the NetSec Focus Admins - netsecfocus.com3Join us on the #"VulnHub & CTF" channel on Mattermost and find people to complete these with!4List of PWK/OSCP boxes from the previous versions of the courseCurrent Systems that are Simliar to the current PWK/OSCP courseOther Vm's to check out!5Kioptrix: Level 1 (#1): https://www.vulnhub.com/entry/kioptrix-level-1-1,22/DC 9: https://www.vulnhub.com/entry/dc-9,412/IMF: https://www.vulnhub.com/entry/imf-1,162/6Kioptrix: Level 1.1 (#2): https://www.vulnhub.com/entry/kioptrix-level-11-2,23/Digitalworld.local (Bravery): https://www.vulnhub.com/entry/digitalworldlocal-bravery,281/Tommy Boy: https://www.vulnhub.com/entry/tommy-boy-1,157/7Kioptrix: Level 1.2 (#3): https://www.vulnhub.com/entry/kioptrix-level-12-3,24/Digitalworld.local (Development): https://www.vulnhub.com/entry/digitalworldlocal-development,280/Billy Madison: https://www.vulnhub.com/entry/billy-madison-11,161/8Kioptrix: Level 1.3 (#4): https://www.vulnhub.com/entry/kioptrix-level-13-4,25Digitalworld.local (Mercy v2): https://www.vulnhub.com/entry/digitalworldlocal-mercy-v2,263/Tr0ll1: https://www.vulnhub.com/entry/tr0ll-1,100/9Kioptrix: 2014: https://www.vulnhub.com/entry/kioptrix-2014-5,62/Digitalworld.local (JOY): https://www.vulnhub.com/entry/digitalworldlocal-joy,298/Tr0ll2: https://www.vulnhub.com/entry/tr0ll-2,107/10FristiLeaks 1.3: https://www.vulnhub.com/entry/fristileaks-13,133/Digitalword.local (FALL): https://www.vulnhub.com/entry/digitalworldlocal-fall,726/ Wallaby's Nightmare: https://www.vulnhub.com/entry/wallabys-nightmare-v102,176/11Stapler 1: https://www.vulnhub.com/entry/stapler-1,150/Prime 1: https://www.vulnhub.com/entry/prime-1,358/Moria: https://www.vulnhub.com/entry/moria-1,187/12VulnOS 2: https://www.vulnhub.com/entry/vulnos-2,147/Symfonos 1: https://www.vulnhub.com/entry/symfonos-1,322/BSides Vancouver 2018: https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/13SickOs 1.2: https://www.vulnhub.com/entry/sickos-12,144/Symfonos 2: https://www.vulnhub.com/entry/symfonos-2,331/DEFCON Toronto Galahad: https://www.vulnhub.com/entry/defcon-toronto-galahad,194/14HackLAB: Vulnix: https://www.vulnhub.com/entry/hacklab-vulnix,48/Symfonos 3: https://www.vulnhub.com/entry/symfonos-3,332/Spydersec: https://www.vulnhub.com/entry/spydersec-challenge,128/15/dev/random: scream: https://www.vulnhub.com/entry/devrandom-scream,47/Symfonos 4: https://www.vulnhub.com/entry/symfonos-4,347/Pinkys Palace v3: https://www.vulnhub.com/entry/pinkys-palace-v3,237/16pWnOS 2.0: https://www.vulnhub.com/entry/pwnos-20-pre-release,34/Symfonos 5.2: https://www.vulnhub.com/entry/symfonos-52,415/Pinkys Palace v4: https://www.vulnhub.com/entry/pinkys-palace-v4,265/17SkyTower 1: https://www.vulnhub.com/entry/skytower-1,96/Misdirection 1: https://www.vulnhub.com/entry/misdirection-1,371/Vulnerable Docker 1: https://www.vulnhub.com/entry/vulnerable-docker-1,208/18Mr-Robot 1: https://www.vulnhub.com/entry/mr-robot-1,151/Sar 1: https://www.vulnhub.com/entry/sar-1,425/Node 1: https://www.vulnhub.com/entry/node-1,252/19PwnLab: https://www.vulnhub.com/entry/pwnlab-init,158/Djinn 1: https://www.vulnhub.com/entry/djinn-1,397/Troll 3: https://www.vulnhub.com/entry/tr0ll-3,340/20Lin.Security: https://www.vulnhub.com/entry/linsecurity-1,244/EVM 1: https://www.vulnhub.com/entry/evm-1,391/Readme 1: https://www.vulnhub.com/entry/readme-1,336/21Temple of Doom: https://www.vulnhub.com/entry/temple-of-doom-1,243/DerpNStink 1: https://www.vulnhub.com/entry/derpnstink-1,221/OZ: https://www.vulnhub.com/entry/oz-1,317/22Pinkys Palace v2: https://www.vulnhub.com/entry/pinkys-palace-v2,229/RickdiculouslyEasy 1: https://www.vulnhub.com/entry/rickdiculouslyeasy-1,207/Metasploitable 3: https://github.com/rapid7/metasploitable323Zico2: https://www.vulnhub.com/entry/zico2-1,210/Tommy Boy 1: https://www.vulnhub.com/entry/tommy-boy-1,157/Election 1: https://www.vulnhub.com/entry/election-1,503/24Wintermute: https://www.vulnhub.com/entry/wintermute-1,239/Breach 1: https://www.vulnhub.com/entry/breach-1,152/Pinkys Palace v1: https://www.vulnhub.com/entry/pinkys-palace-v1,225/25Tr0ll 1: https://www.vulnhub.com/entry/tr0ll-1,100/ Breach 2.1: https://www.vulnhub.com/entry/breach-21,159/Hacker Kid: 1.0.1: https://www.vulnhub.com/entry/hacker-kid-101,719/26Tr0ll 2: https://www.vulnhub.com/entry/tr0ll-2,107/Breach 3.0.1: https://www.vulnhub.com/entry/breach-301,177/27Web Developer 1: https://www.vulnhub.com/entry/web-developer-1,288/NullByte: https://www.vulnhub.com/entry/nullbyte-1,126/28SolidState: https://www.vulnhub.com/entry/solidstate-1,261/Bob 1.0.1: https://www.vulnhub.com/entry/bob-101,226/29Hackme 1: https://www.vulnhub.com/entry/hackme-1,330/Toppo 1: https://www.vulnhub.com/entry/toppo-1,245/30Escalate_Linux: 1: https://www.vulnhub.com/entry/escalate_linux-1,323/W34kn3ss 1: https://www.vulnhub.com/entry/w34kn3ss-1,270/31DC 6: https://www.vulnhub.com/entry/dc-6,315/GoldenEye 1: https://www.vulnhub.com/entry/goldeneye-1,240/32Infosec Prep OSCP Box: https://www.vulnhub.com/entry/infosec-prep-oscp,508/33LemonSqueezy: https://www.vulnhub.com/entry/lemonsqueezy-1,473/34Brainpan 1: https://www.vulnhub.com/entry/brainpan-1,51/35Lord of the root 1.0.1: https://www.vulnhub.com/entry/lord-of-the-root-101,129/36Tiki-1: https://www.vulnhub.com/entry/tiki-1,525/37Healthcare 1: https://www.vulnhub.com/entry/healthcare-1,522/38Photographer 1: https://www.vulnhub.com/entry/photographer-1,519/39Glasglow 1.1: https://www.vulnhub.com/entry/glasgow-smile-11,491/40DevGuru 1: https://www.vulnhub.com/entry/devguru-1,620/41Alpha 1: https://www.vulnhub.com/entry/alfa-1,655/42Hack Me Please: https://www.vulnhub.com/entry/hack-me-please-1,731/4344454647484950515253545556575859ABC1Proving Grounds Play VM LIST: Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam.Do not forget to check the other tabs in this list below!: 2Curated by TJ Null at netsecfocus.com3Join us on the #"VulnHub & CTF" channel on Mattermost and find people to complete these with!IIf you do not see the box currently listed in PG you can play with it in the retired section on PG Practice or Download them from Vulnhub!45Linux:Harder Boxes to try out...6Born2RootDjinn37SoSimpleGLASGOW SMILE: 1.18StaplerPowerGrid 1.0.19HA: WordyGITROOT: 110SO SIMPLE: 1Dawn211TRE: 1 (Although Idk If I would do the priv esc in a real world scenario ¯\_(ツ)_/¯ )12SUNSET: MIDNIGHT13InfosecPrep14Seppuku15161718192021ABC1Proving Grounds Practice VM LIST: Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam.Do not forget to check the other tabs in this list below!: 2Curated by TJ Null at netsecfocus.com3Join us on the #"VulnHub & CTF" channel on Mattermost and find people to complete these with!45Windows:Linux:Harder Boxes to try out...6NickelClamAVBratarina7SlortWomboInternal8AuthbyPaydayClyde9JackoFailVector10MeatHeadNibblesShifty11UT99BanzaiXposedAPI12MedJedHunitHelpDesk13AlgeronDibbleTwiggy14BillybossZinoPebbles15ButchHetemitPanic16KevinPeppoCookieCutter17MetallusPostfish18HutchMalbec19HeistSybaris20Vault (Requires some MITM)Hawat21ShenziFail22UT99ZenPhoto23Tico242526272829303132333435363738394041424344ABCDEF1HACKTHEBOX VM LIST: Do not forget to check the other tabs in this list below!: 2Curated by: TJnull at Netsec Focus3Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam.4Linux Boxes:Windows Boxes:More challenging than OSCP, but good practice:Updated Boxes for December 2021: 5LamelegacyJeeves [Windows]ScriptKiddie [Linux]6brainfuckBlueBart
[Windows]Armageddon [Linux]8bashedOptimumKotarak [Linux]Love [Windows]9nibblesBastardfalafel [Linux]Knife [Linux]10beepgrannyDevops [Linux]Pit [Linux]11cronosArcticHawk [Linux]Monitors [Linux]12ninevehgrandpaNetmon [Windows]Dynstr [Linux]13sensesiloLightweight [Linux]PivotAPI [Windows]14solidstatebountyLa Casa De Papel [Linux]Seal [Linux]15nodejerryJail [Linux]Intelligence [Windows]16valentineconcealSafe [Linux]Pikaboo [Linux]17poisonchatterboxBitlab [Linux]APT [Windows]18sundayForestSizzle [Windows] Monteverde [Windows]19tartarsauceBankRobberSniper [Windows]20IrkedsecnotesControl [Windows]21FriendzoneBastionOctober [Linux]22SwagshopBuffMango [Linux]23NetworkedServmonNest [Windows]24jarvisActiveBook [Linux]25MiraiRemoteSauna [Windows]26PopcornFuseCascade [Windows]27HaircutOmniQuerier [Windows]28BlockyWorkerQuick [Linux]29FrolicLoveBlackField [Windows]30PostmanIntelligenceAPT [Windows]31MangoAPTAtom [Windows]32TraverxecBreadCrumbs [Windows] 33OpenAdminMonitors [Linux]34MagicDynstr [Linux]35AdmirerPivotAPI [Windows]36BlunderPikaboo [Linux]37Tabby Monteverde [Windows]38Doctor39SneakyMailer40Passage41Luanne42Time43Ready44Delivery45Ophiuchi46ScriptKiddie47Armageddon48Knife49Pit50Seal [Linux]51525354A1ABCDEF1Vulnhub/Hackthebox OSWE-like VMsClick the tab below for VulnHub/HacktheBox vm's for OSCP2Curated by: TJnull at Netsec Focus3Hackthebox4Linux Boxes:Windows Boxes:More challenging than OSWE, but good practice:5VaultJSONArkham 6popcorn Hackback7CelestialHoliday8Blocky (Good to practice with JD-GUI)9Falafel10Zipper11Unattended12Help13Mango [Focus on creating your own Boolean Script]14Schooled15Sink16Monitors1718192021222324252627282930Vulnhub31Silky-CTF: 0x02: https://www.vulnhub.com/entry/silky-ctf-0x02,307/Flick 2: https://www.vulnhub.com/entry/flick-2,122/32bwapp: https://www.vulnhub.com/series/bwapp,34/33Homeless 1: https://www.vulnhub.com/entry/homeless-1,215/34Seattle 0.3 https://www.vulnhub.com/entry/seattle-v03,145/35Ted 1: https://www.vulnhub.com/entry/ted-1,327/36Raven 2: https://www.vulnhub.com/entry/raven-2,269/37Potato: https://www.vulnhub.com/entry/potato-1,529/38Secure Code 1: https://www.vulnhub.com/entry/securecode-1,651/3940414243