Vulnerable Machine Challenges
Overview
Use a service like Vulnhub, TryHackMe, CyberSecLabs, or Hack the Box. Download vulnerable virtual machines. Probe for and analyze vulnerabilities.
If you are just beginning, follow walkthrough demonstrations in the form of videos and write-ups to understand the thinking process of probing for and exploiting various types of vulnerabilities.
Project Recommendations
It is recommended you have familiarity with Linux, a foundational understanding of networks, knowledge of the different types of attacks, an understanding of popular penetration testing tools and techniques, formidable researching and exploratory skills.
Starting Resources & Links
Recommended Level
Beginner, Intermediate, and Advanced
Project Author Credit: None – General Project Idea