Vulnerable Machine Challenges

Overview

Use a service like Vulnhub, TryHackMe, CyberSecLabs, or Hack the Box. Download vulnerable virtual machines. Probe for and analyze vulnerabilities.

If you are just beginning, follow walkthrough demonstrations in the form of videos and write-ups to understand the thinking process of probing for and exploiting various types of vulnerabilities.

Project Recommendations

It is recommended you have familiarity with Linux, a foundational understanding of networks, knowledge of the different types of attacks, an understanding of popular penetration testing tools and techniques, formidable researching and exploratory skills.

Recommended Level

Beginner, Intermediate, and Advanced

Project Author Credit: None – General Project Idea