https://www.vulnhub.com/entry/wireless-1,669/Nmap scan ports.nmap -sV -p- -oN ports.log 192.168.33.136Scan port 80, only index.html.Visit port 8000, look like a cms site. Take care the upper-left, there is a username "ji
https://hackmyvm.eu/machines/machine.php?vm=DiophanteScan ports, noticed port 25 maybe open, it's smtp service.nmap -sV -sC -p- -oN ports.log 192.168.56.100Dir scan port 80.Check note.txt, it's a hint about knock
https://hackmyvm.eu/machines/machine.php?vm=CloverScan ports.nmap -sV -sC -p- 192.168.56.99 -oN ports.logLog in ftp anonymous, found 5 text files, but no useful.Scan port 80.gobuster dir -u http://19
https://hackmyvm.eu/machines/machine.php?vm=Driftingblues7Scan ports.nmap -sV -sC -p- 192.168.56.99 -oN ports.logCheck port 80, redirect to port 443, it's eyesofnetwork app login panel.Scan port 66.gobuster&nbs
https://www.vulnhub.com/entry/shenron-2,677/Scan ports.Scan port 80, nothing useful.Scan 8080, looks like a wordpress site.Check source code of index.php, in order to make wordpress works, need to add http://shenron to /etc/hosts. Wpscan found
https://www.vulnhub.com/entry/hacksudo-aliens,676/Scan ports.Scan port 80.In /backup/mysql.bak, found credentials.Log in phpmyadmin at port 9000 using this credentials. Create a shell php.SELECT "<?php system($_GET['c'
https://hackmyvm.eu/machines/machine.php?vm=T800Very interesting machine, I have to spend whole day learning how to doX11 forwarding and how to config conky, in order to solve it.Scan ports first.Scan port 80, at /index.html, found username "ruu
https://www.vulnhub.com/entry/bluemoon-2021,679/Simple and straightforward one.Scan ports.Scan port 80, check hidden_text file.Decrypt the png to text,get username and password of ftp.Login ftp, download information.txt, find username robin, and a pa
https://hackmyvm.eu/machines/machine.php?vm=EightyInteresting machine, thanks sML@HackMyVm.Scan ports.Port 80 is unavailable right now. Port 70 is not http, but gopher (which is not familiar).We can use firefox to visit port 70. Also, we can use &quo
https://hackmyvm.eu/machines/machine.php?vm=EyesScan ports.Log in ftp as anonymous, and get index.php.Check the source code of index.php, has LFI.<?php
$file = $_GET['fil3'];
if(isset($file))
{
include($file);
}
else
{
pr