LeadingAlltheWay

Vulnhub


VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration.

How to start:

Download the VMs that you want to start off with and set it up with VMWare or VirtualBox, whichever one you prefer. I would suggest starting with Metasploitable 2, call this your vulnerable machine.


Have another VM setup, preferably running Kali OS, from which you will attack the vulnerable machine, call it your staging machine.


The reason for suggesting Metasploitable 2 is, it contains basic network pentesting and web application pentesting, which will help you learn a lot.


As far as the setting up the virtual machines are concerned, staging machine or vulnerable machine, Google is a reliable source of assistance.


There are walkthroughs available for many vulnerable machines. You can possibly start by going through one of them to gauge how to test the machine, and then venture out on your own with several other vulnerable machines on VulnHub.

Did you find this tutorial helpful? Let us know!

About the Author
Jyri

Passionate about helping people create amazing websites for free. Sharing knowledge and tutorials to make web development accessible to everyone.

About this Category
LeadingAlltheWay

Type: Ethical Cyber Defense Strategy - Learn about whitehat hacking and ethical cybersecurity. We ONLY approve whitehat security practices for legal defense and security research. Black hat and gray hat hacking is NOT permitted.

View Category
Related Tutorials
Hydra
12 views 2 days ago
SQLMAP
14 views 4 days ago
Wigle
14 views 4 days ago

Discussion

Join the Discussion

Sign in to leave comments and connect with other website builders.

No comments yet

Be the first to share your thoughts about this tutorial!

Found This Tutorial Helpful?

Explore more free tutorials and guides to build amazing websites without spending a penny.