Latest vulnerable machines- MrLeet


MrLeet provides vulnerables machines allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Machine: DC-6
By: dcau 2019-05-18 11:12:55

MrLeet

Machine Details: DC-6 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

This isn't an overly difficult challenge so should be great for beginn...

Machine Size: 618
Machine OS: linux
Machine Level: intermediate


Score: 0

Machine: DC-5
By: dcau 2019-05-18 11:12:59

MrLeet

Machine Details: DC-5 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

The plan was for DC-5 to kick it up a notch, so this might not be great for...

Machine Size: 521
Machine OS: linux
Machine Level: intermediate


Score: 0

Machine: DC-4
By: dcau 2019-05-24 10:35:17

MrLeet

Machine Details: DC-4 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

Unlike the previous DC releases, this one is designed primarily for beginne...

Machine Size: 617
Machine OS: linux
Machine Level: intermediate


Score: -5

Latest walkthrough of machines- MrLeet


MrLeet provides walkthrough of vulnerable machines allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Walkthrough of: Matrix_1
By: unknowndevice64 2019-05-17 12:40:46

MrLeet

Discovery
First, we need to recognize the IP that the machine is using, I use arp-scan for the job but you can use netdiscover or nmap to do the trick, with arp-scan is like this:

arp-scan -l
This puts out a list of all the machines in the network that a re sending ARP packets, the output looks like this:

The IP of the machine identified
With that, we can proceed to do some footprinting u...


Score: 0

Latest notes for PenTesting- MrLeet


MrLeet provides useful notes from different hackers allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.

There are many distributions of linux, and they all do things a little different regarding default security and built-in tool sets. Which means when engaging these different flavors during a pentest, what works against one linux target to get an interactive shell, may not work against another. Well, not to worry my friends, there are many technique...


Score: 0


The amazing netcat, used for so many fantastic things. If you’re learning the basics of penetration testing look into this tool inside out.

Too:
Netcat


Connect to a TCP Port

nc -nv <IP Address> <Port>
Listen on a TCP Port

nc -lvp <port>
Connect and receive a HTTP Page

nc -nv <IP Address> 80
HEAD / HTTP...


Score: 0


Once a meterpreter shell is obtained on a system a larger range of options is available to the Penetration Tester for accessing the system. In a hypothetical scenario the victim is running a vulnerable mail server on port 25, and we have a remote exploit we wish to use against it. Unfortunately for us it’s behind a firewall. After getting a meter...


Score: 0

Latest picturess useful in PenTesting- MrLeet


MrLeet provides useful pictures from different hackers useful in digital security, computer applications and network administration tasks.
By: ajayverma 2019-05-29 15:22:44


Assembly Basics Cheatsheet


Score: 0

By: ajayverma 2019-05-29 15:22:57


Git Cheat Sheet


Score: 0

By: ajayverma 2019-05-28 15:24:49


SANS-Netcat Cheat Sheet


Score: 0

By: ajayverma 2019-05-28 15:25:15


Windows to unix cheatsheet


Score: 0

By: ajayverma 2019-05-28 15:24:54


Power Shell Cheat Sheet


Score: 0