Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Session 06

Vulnerable Machine I

Unless you've done some Hack The Box machines, this is your first vulnerable machine you'll try to break into and find the flag.txt file.

To make things a bit easier and straight-forward, here's a suggested list of tools that might help you accomplish the task, in no particular order:

  • nmap
  • dirb (Dir Buster)
  • john (John the Ripper)
  • hydra
  • curl
  • ftp
  • ssh
  • firefox (or any browser, really)
  • hash-identifier

Info

In the lab, the machine will be set up for you, and you'll be given a unique IP address for your group (2-3 students) to work on.

After the lab, if you're interested, you'll have the option to copy the machine to a USB stick and work on it in your own time. The VM is in an importable OVA format, ready to be imported into VirtualBox. The size is ~1.5GB.

Note

Remember the different attack steps from the previous lectures, and which ones you will apply here.

Think: "What's the first thing I need to do to get information about the target?"

For the most part, you'll be on your own, and I'll come around and check on you. If you are stuck, let me know, and I'll try to help without giving away too much.

[ Last updated: Tuesday 28 October 2025 @ 22:16:52 +0000 // branch: master // commit: 5ebe398 ]