A | B | C | |
---|---|---|---|
1 | PWK V1 LIST: | Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam. | |
2 | Curated by Tj Null - netsecfocus.com | ||
3 | This list contains boxes that were used in preparation for going through the V1 of the PWK course | ||
4 | |||
5 | Vulnhub: | ||
6 | Current Systems that are Simliar to the PWK/OSCP V1 course at the time | Other Vm's to check out! | |
7 | Kioptrix: Level 1 (#1): https://www.vulnhub.com/entry/kioptrix-level-1-1,22/ | Tr0ll1: https://www.vulnhub.com/entry/tr0ll-1,100/ | |
8 | Kioptrix: Level 1.1 (#2): https://www.vulnhub.com/entry/kioptrix-level-11-2,23/ | Tr0ll2: https://www.vulnhub.com/entry/tr0ll-2,107/ | |
9 | Kioptrix: Level 1.2 (#3): https://www.vulnhub.com/entry/kioptrix-level-12-3,24/ | Wallaby's Nightmare: https://www.vulnhub.com/entry/wallabys-nightmare-v102,176/ | |
10 | Kioptrix: Level 1.3 (#4): https://www.vulnhub.com/entry/kioptrix-level-13-4,25 | Moria: https://www.vulnhub.com/entry/moria-1,187/ | |
11 | Kioptrix: 2014: https://www.vulnhub.com/entry/kioptrix-2014-5,62/ | BSides Vancouver 2018: https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/ | |
12 | FristiLeaks 1.3: https://www.vulnhub.com/entry/fristileaks-13,133/ | DEFCON Toronto Galahad: https://www.vulnhub.com/entry/defcon-toronto-galahad,194/ | |
13 | Stapler 1: https://www.vulnhub.com/entry/stapler-1,150/ | Spydersec: https://www.vulnhub.com/entry/spydersec-challenge,128/ | |
14 | VulnOS 2: https://www.vulnhub.com/entry/vulnos-2,147/ | Pinkys Palace v3: https://www.vulnhub.com/entry/pinkys-palace-v3,237/ | |
15 | SickOs 1.2: https://www.vulnhub.com/entry/sickos-12,144/ | Pinkys Palace v4: https://www.vulnhub.com/entry/pinkys-palace-v4,265/ | |
16 | HackLAB: Vulnix: https://www.vulnhub.com/entry/hacklab-vulnix,48/ | Vulnerable Docker 1: https://www.vulnhub.com/entry/vulnerable-docker-1,208/ | |
17 | /dev/random: scream: https://www.vulnhub.com/entry/devrandom-scream,47/ | Node 1: https://www.vulnhub.com/entry/node-1,252/ | |
18 | pWnOS 2.0: https://www.vulnhub.com/entry/pwnos-20-pre-release,34/ | Troll 3: https://www.vulnhub.com/entry/tr0ll-3,340/ | |
19 | SkyTower 1: https://www.vulnhub.com/entry/skytower-1,96/ | Readme 1: https://www.vulnhub.com/entry/readme-1,336/ | |
20 | Mr-Robot 1: https://www.vulnhub.com/entry/mr-robot-1,151/ | OZ: https://www.vulnhub.com/entry/oz-1,317/ | |
21 | PwnLab: https://www.vulnhub.com/entry/pwnlab-init,158/ | Metasploitable 3: https://github.com/rapid7/metasploitable3 | |
22 | Lin.Security: https://www.vulnhub.com/entry/linsecurity-1,244/ | Election 1: https://www.vulnhub.com/entry/election-1,503/ | |
23 | Temple of Doom: https://www.vulnhub.com/entry/temple-of-doom-1,243/ | IMF: https://www.vulnhub.com/entry/imf-1,162/ | |
24 | Pinkys Palace v2: https://www.vulnhub.com/entry/pinkys-palace-v2,229/ | Tommy Boy: https://www.vulnhub.com/entry/tommy-boy-1,157/ | |
25 | Zico2: https://www.vulnhub.com/entry/zico2-1,210/ | Billy Madison: https://www.vulnhub.com/entry/billy-madison-11,161/ | |
26 | Wintermute: https://www.vulnhub.com/entry/wintermute-1,239/ | Pinkys Palace v1: https://www.vulnhub.com/entry/pinkys-palace-v1,225/ | |
27 | Tr0ll 1: https://www.vulnhub.com/entry/tr0ll-1,100/ | ||
28 | Tr0ll 2: https://www.vulnhub.com/entry/tr0ll-2,107/ | ||
29 | Web Developer 1: https://www.vulnhub.com/entry/web-developer-1,288/ | ||
30 | SolidState: https://www.vulnhub.com/entry/solidstate-1,261/ | ||
31 | Hackme 1: https://www.vulnhub.com/entry/hackme-1,330/ | ||
32 | Escalate_Linux: 1: https://www.vulnhub.com/entry/escalate_linux-1,323/ | ||
33 | DC 6: https://www.vulnhub.com/entry/dc-6,315/ | ||
34 | |||
35 | Hackthebox: | ||
36 | Linux Boxes: | Windows Boxes: | More challenging than OSCP, but good practice: |
37 | Lame | legacy | Jeeves [Windows] |
38 | brainfuck | Blue | Bart [Windows] |
39 | shocker | Devel | Tally [Windows] |
40 | bashed | Optimum | Kotarak [Linux] |
41 | nibbles | Bastard | falafel [Linux] |
42 | beep | granny | Devops [Linux] |
43 | cronos | Arctic | Hawk [Linux] |
44 | nineveh | grandpa | Netmon [Windows] |
45 | sense | silo | Lightweight [Linux] |
46 | solidstate | bounty | La Casa De Papel [Linux] |
47 | node | jerry | Jail [Linux] |
48 | valentine | conceal | Safe [Linux] |
49 | poison | chatterbox | Bitlab [Linux] |
50 | sunday | Forest | Sizzle [Windows] |
51 | tartarsauce | BankRobber | Sniper [Windows] |
52 | Irked | secnotes | Control [Windows] |
53 | Friendzone | Bastion | October [Linux] |
54 | Swagshop | Buff | |
55 | Networked | Servmon | |
56 | jarvis | Active |
A | B | C | |
---|---|---|---|
1 | PWK V2 LIST: | Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam. | |
2 | Curated by Tj Null - netsecfocus.com | ||
3 | This list contains boxes that were used in preparation for going through the V2 of the PWK/ PEN 200 2022 course | ||
4 | |||
5 | Vulnhub: | ||
6 | Current Systems that are Simliar to the PWK/OSCP V2 course at the time | Other VM's to check out: | |
7 | DC 9: https://www.vulnhub.com/entry/dc-9,412/ | IMF: https://www.vulnhub.com/entry/imf-1,162/ | |
8 | Digitalworld.local (Bravery): https://www.vulnhub.com/entry/digitalworldlocal-bravery,281/ | Tommy Boy: https://www.vulnhub.com/entry/tommy-boy-1,157/ | |
9 | Digitalworld.local (Development): https://www.vulnhub.com/entry/digitalworldlocal-development,280/ | Billy Madison: https://www.vulnhub.com/entry/billy-madison-11,161/ | |
10 | Digitalworld.local (Mercy v2): https://www.vulnhub.com/entry/digitalworldlocal-mercy-v2,263/ | Tr0ll1: https://www.vulnhub.com/entry/tr0ll-1,100/ | |
11 | Digitalworld.local (JOY): https://www.vulnhub.com/entry/digitalworldlocal-joy,298/ | Tr0ll2: https://www.vulnhub.com/entry/tr0ll-2,107/ | |
12 | Digitalword.local (FALL): https://www.vulnhub.com/entry/digitalworldlocal-fall,726/ | Wallaby's Nightmare: https://www.vulnhub.com/entry/wallabys-nightmare-v102,176/ | |
13 | Prime 1: https://www.vulnhub.com/entry/prime-1,358/ | Moria: https://www.vulnhub.com/entry/moria-1,187/ | |
14 | Misdirection 1: https://www.vulnhub.com/entry/misdirection-1,371/ | BSides Vancouver 2018: https://www.vulnhub.com/entry/bsides-vancouver-2018-workshop,231/ | |
15 | Sar 1: https://www.vulnhub.com/entry/sar-1,425/ | DEFCON Toronto Galahad: https://www.vulnhub.com/entry/defcon-toronto-galahad,194/ | |
16 | Djinn 1: https://www.vulnhub.com/entry/djinn-1,397/ | Spydersec: https://www.vulnhub.com/entry/spydersec-challenge,128/ | |
17 | EVM 1: https://www.vulnhub.com/entry/evm-1,391/ | Pinkys Palace v3: https://www.vulnhub.com/entry/pinkys-palace-v3,237/ | |
18 | DerpNStink 1: https://www.vulnhub.com/entry/derpnstink-1,221/ | Pinkys Palace v4: https://www.vulnhub.com/entry/pinkys-palace-v4,265/ | |
19 | RickdiculouslyEasy 1: https://www.vulnhub.com/entry/rickdiculouslyeasy-1,207/ | Vulnerable Docker 1: https://www.vulnhub.com/entry/vulnerable-docker-1,208/ | |
20 | Tommy Boy 1: https://www.vulnhub.com/entry/tommy-boy-1,157/ | Node 1: https://www.vulnhub.com/entry/node-1,252/ | |
21 | Breach 1: https://www.vulnhub.com/entry/breach-1,152/ | Troll 3: https://www.vulnhub.com/entry/tr0ll-3,340/ | |
22 | Breach 2.1: https://www.vulnhub.com/entry/breach-21,159/ | Readme 1: https://www.vulnhub.com/entry/readme-1,336/ | |
23 | Breach 3.0.1: https://www.vulnhub.com/entry/breach-301,177/ | OZ: https://www.vulnhub.com/entry/oz-1,317/ | |
24 | NullByte: https://www.vulnhub.com/entry/nullbyte-1,126/ | Metasploitable 3: https://github.com/rapid7/metasploitable3 | |
25 | Bob 1.0.1: https://www.vulnhub.com/entry/bob-101,226/ | Election 1: https://www.vulnhub.com/entry/election-1,503/ | |
26 | Toppo 1: https://www.vulnhub.com/entry/toppo-1,245/ | Pinkys Palace v1: https://www.vulnhub.com/entry/pinkys-palace-v1,225/ | |
27 | W34kn3ss 1: https://www.vulnhub.com/entry/w34kn3ss-1,270/ | Hacker Kid: 1.0.1: https://www.vulnhub.com/entry/hacker-kid-101,719/ | |
28 | GoldenEye 1: https://www.vulnhub.com/entry/goldeneye-1,240/ | ||
29 | Infosec Prep OSCP Box: https://www.vulnhub.com/entry/infosec-prep-oscp,508/ | ||
30 | LemonSqueezy: https://www.vulnhub.com/entry/lemonsqueezy-1,473/ | ||
31 | Brainpan 1: https://www.vulnhub.com/entry/brainpan-1,51/ | ||
32 | Lord of the root 1.0.1: https://www.vulnhub.com/entry/lord-of-the-root-101,129/ | ||
33 | Tiki-1: https://www.vulnhub.com/entry/tiki-1,525/ | ||
34 | Healthcare 1: https://www.vulnhub.com/entry/healthcare-1,522/ | ||
35 | Photographer 1: https://www.vulnhub.com/entry/photographer-1,519/ | ||
36 | Glasglow 1.1: https://www.vulnhub.com/entry/glasgow-smile-11,491/ | ||
37 | DevGuru 1: https://www.vulnhub.com/entry/devguru-1,620/ | ||
38 | Alpha 1: https://www.vulnhub.com/entry/alfa-1,655/ | ||
39 | Hack Me Please: https://www.vulnhub.com/entry/hack-me-please-1,731/ | ||
40 | |||
41 | Hackthebox: | ||
42 | Linux Boxes: | Windows Boxes: | More challenging than OSCP, but good practice: |
43 | sense | Blue | Netmon [Windows] |
44 | nibbles | Artic | Lightweight [Linux] |
45 | solidstate | bounty | La Casa De Papel [Linux] |
46 | node | jerry | Jail [Linux] |
47 | valentine | conceal | Safe [Linux] |
48 | poison | chatterbox | Bitlab [Linux] |
49 | sunday | Forest | Sizzle [Windows] |
50 | tartarsauce | BankRobber | Sniper [Windows] |
51 | Irked | secnotes | Control [Windows] |
52 | Friendzone | Bastion | October [Linux] |
53 | Swagshop | Buff | Mango [Linux] |
54 | Networked | Servmon | Nest [Windows] |
55 | jarvis | Active | Book [Linux] |
56 | Mirai | Remote | Sauna [Windows] |
57 | Popcorn | Fuse | Cascade [Windows] |
58 | Haircut | Omni | Querier [Windows] |
59 | Blocky | Worker | Quick [Linux] |
60 | Frolic | Love | BlackField [Windows] |
61 | Postman | Intelligence | APT [Windows] |
62 | Mango | APT | Atom [Windows] |
63 | Traverxec | Object | BreadCrumbs [Windows] |
64 | OpenAdmin | Support | Monitors [Linux] |
65 | Magic | Acute | Dynstr [Linux] |
66 | Admirer | Timelapse | PivotAPI [Windows] |
67 | Blunder | StreamIO | Pikaboo [Linux] |
68 | Tabby | Scrambled | Monteverde [Windows] |
69 | Doctor | Writer [Linux] | |
70 | SneakyMailer | Forge [Linux] | |
71 | Passage | Stacked [Linux] | |
72 | Luanne | Backdoor[Linux] | |
73 | Time | Search[Windows] | |
74 | Ready | Undetected[Linux] (More like an IR box) | |
75 | Delivery | ||
76 | Ophiuchi | ||
77 | ScriptKiddie | ||
78 | Armageddon | ||
79 | Knife | ||
80 | Pit | ||
81 | Seal | ||
82 | Previse | ||
83 | Forge | ||
84 | Horizontall | ||
85 | Shibboleth | ||
86 | Writer | ||
87 | Precise | ||
88 | Pandora | ||
89 | Meta | ||
90 | Paper | ||
91 | Talkative | ||
92 | Seventeen | ||
93 | |||
94 | Proving Grounds Play: | ||
95 | Linux: | Harder Boxes to try out... | |
96 | SoSimple | Djinn3 | |
97 | Stapler | GLASGOW SMILE: 1.1 | |
98 | SO SIMPLE: 1 | PowerGrid 1.0.1 | |
99 | TRE: 1 (Although Idk If I would do the priv esc in a real world scenario ¯\_(ツ)_/¯ ) | GITROOT: 1 | |
100 | SUNSET: MIDNIGHT | Dawn2 | |
101 | InfosecPrep | DC-3 | |
102 | Seppuku | DC-4 | |
103 | DC-1 | ICMP | |
104 | DC-2 | ||
105 | Assertion101 | ||
106 | FunboxEasy | ||
107 | FunboxEasyEnum | ||
108 | DriftingBlue6 | ||
109 | |||
110 | Proving Grounds Practice: | ||
111 | Nickel | ClamAV | |
112 | Slort | Wombo | |
113 | Authby | Payday | |
114 | Jacko | Fail | |
115 | MeatHead | Nibbles | |
116 | UT99 | Banzai | |
117 | MedJed | Hunit | |
118 | Algeron | Dibble | |
119 | Billyboss | Zino | |
120 | Kevin | Hetemit | |
121 | Metallus | Peppo | |
122 | Hutch | Postfish (Requires some Phishing) | |
123 | Heist | Malbec | |
124 | Vault (Requires some MITM) | Sybaris | |
125 | Shenzi | Hawat | |
126 | DVR4 | ZenPhoto | |
127 | Craft | Readys | |
128 | Hepet | Nukem | |
129 | Squid | Sorcerer | |
130 | compromised | Walla | |
131 | robust | Pelican | |
132 | resourced | Snookums | |
133 | Craft2 | Exfiltrated | |
134 | Walla | ||
135 | Voip | ||
136 | ERP | ||
137 | Depreciated | ||
138 | Wheels |
A | B | C | D | |
---|---|---|---|---|
1 | PWK V3 LIST: | Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the PWK/OSCP course. When you are taking the course, It is encouraged that you try to go through every system that is in the PWK/OSCP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSCP Exam. | ||
2 | Curated by Tj Null - netsecfocus.com | |||
3 | This list contains boxes that were used in preparation for going through the V3 of the PWK/ PEN 200 2023 course | |||
4 | ||||
5 | Hackthebox: | |||
6 | Linux Boxes: | Windows Boxes: | More challenging than OSCP, but good practice: | ProLabs: |
7 | Busqueda | Jeeves | Mentor [Linux] | Dante |
8 | UpDown | Active | Absolute [Windows] | Dante |
9 | Cereal | Forest | Outdated [Windows] | |
10 | Pandora | Escape | Atom [Windows] | |
11 | Broker | Flight | APT [Windows] | |
12 | Intentions | Servmon | Aero [Windows] | |
13 | Soccer | Support | Cerberus [Windows/Linux] | |
14 | StreamIO | Multimaster [Windows] | ||
15 | Blackfield | Quick [Linux] | ||
16 | Intelligence | |||
17 | ||||
18 | ||||
19 | ||||
20 | ||||
21 | ||||
22 | ||||
23 | ||||
24 | ||||
25 | Proving Grounds Practice: | |||
26 | Linux Boxes: | Windows Boxes: | More challenging than OSCP, but good practice: | |
27 | Twiggy | Helpdesk | Nagoya [Windows] | |
28 | Exfiltrated | Access | Osaka [Windows] | |
29 | Pelican | Algernon | ProStore [Linux] | |
30 | Astronaut | Authby | RPC1 [Linux] | |
31 | Blackgate | Craft2 | Symbolic [Windows] | |
32 | Boolean | Heist | Upsploit [Linux] | |
33 | Clue | Hutch | Validator [Linux] | |
34 | Cockpit | Internal | GLPI [Linux] | |
35 | Codo | Jacko | ||
36 | Crane | Kevin | ||
37 | Educated | Kyoto | ||
38 | Extplorer | Nara | ||
39 | Hub | Resourced | ||
40 | Image | Squid | ||
41 | law | |||
42 | Marshalled | |||
43 | PC | |||
44 | Plum | |||
45 | Press | |||
46 | PyLoader | |||
47 | RubyDome | |||
48 | Zipper | |||
49 | BBSCute | |||
50 | ||||
51 | ||||
52 | ||||
53 | ||||
54 | ||||
55 | ||||
56 | Proving Grounds Play: | |||
57 | Linux Boxes: | More challenging than OSCP, but good practice: | ||
58 | eLection | |||
59 | Stapler | - | ||
60 | Monitoring | |||
61 | InsanityHosting | |||
62 | DriftingBlue6 | |||
63 | Blogger | |||
64 | DC-9 | |||
65 | Amaterasu | |||
66 | ||||
67 | ||||
68 | ||||
69 | ||||
70 | Vulnlab: | |||
71 | Linux Boxes: | Windows Boxes: | More challenging than OSCP, but good practice: | |
72 | Data | Baby | Rainbow 1 | |
73 | Feedback | Baby2 | Raibow 2 | |
74 | Sync | Breach | Reaper | |
75 | Dump | Media | Zero | |
76 | Bruno | Control (Chain) | ||
77 | Job2 | |||
78 | Hybrid (Chain) | |||
79 | Trusted (Chain) |
A | B | C | D | |
---|---|---|---|---|
1 | PEN-300 OSEP VM LIST: | Disclaimer: The boxes that are contained in this list should be used as a way to get started, to build your practical skills, or brush up on any weak points that you may have in your pentesting methodology. This list is not a substitute to the actual lab environment that is in the ETDB/OSEP course. When you are taking the course, It is encouraged that you try to go through every system that is in the ETDB/OSEP lab environment, as they will provide better insight for when you attempt to the exam itself. This list is not exhaustive, nor does it guarantee a passing grade for the OSEP Exam. | Do not forget to check the other tabs in this list below!: | |
2 | Curated by TJ Null at netsecfocus.com | |||
3 | ||||
4 | Hackthebox: | |||
5 | Linux Boxes: | Windows Boxes: | More challenging than OSEP, but good practice: | ProLabs |
6 | Magic | Control | Search [Windows] | RastaLabs |
7 | OpenAdmin | APT | PivotAPI [Windows] | Offshore |
8 | Forge | Hathor | Search [Windows] | |
9 | Seal | Sekhmet | Sizzle [Windows] | |
10 | MultiMaster | Anubis [Windows] | ||
11 | Absolute | Monteverde [Windows] | ||
12 | Escape | Absolute [Windows] | ||
13 | Querier | |||
14 | Scrambled | |||
15 | StreamIO | |||
16 | Outdated | |||
17 | Monteverde | |||
18 | Support | |||
19 | Flight | |||
20 | Forest | |||
21 | TimeLapse |
A | B | C | D | E | F | |
---|---|---|---|---|---|---|
1 | Vulnhub/Hackthebox OSWE-like VMs | Do not forget to check the other tabs in this list below!: | ||||
2 | Curated by: TJnull at Netsec Focus | |||||
3 | Hackthebox | |||||
4 | Linux Boxes: | Windows Boxes: | More challenging than OSWE, but good practice: | |||
5 | Vault | JSON | Arkham | |||
6 | popcorn | Hackback | ||||
7 | Celestial | Holiday | ||||
8 | Blocky (Good to practice with JD-GUI) | |||||
9 | Falafel | |||||
10 | Zipper | |||||
11 | Unattended | |||||
12 | Help | |||||
13 | Mango [Focus on creating your own Boolean Script] | |||||
14 | Schooled | |||||
15 | Sink | |||||
16 | Monitors | |||||
17 | Magic | |||||
18 | Fulcrum | |||||
19 | Unobtainium | |||||
20 | Crossfit | |||||
21 | Crossfit2 | |||||
22 | Stacked | |||||
23 | Fingerprint | |||||
24 | ||||||
25 | ||||||
26 | ||||||
27 | ||||||
28 | ||||||
29 | ||||||
30 | Vulnhub | |||||
31 | Silky-CTF: 0x02: https://www.vulnhub.com/entry/silky-ctf-0x02,307/ | Flick 2: https://www.vulnhub.com/entry/flick-2,122/ | ||||
32 | bwapp: https://www.vulnhub.com/series/bwapp,34/ | |||||
33 | Homeless 1: https://www.vulnhub.com/entry/homeless-1,215/ | |||||
34 | Seattle 0.3 https://www.vulnhub.com/entry/seattle-v03,145/ | |||||
35 | Ted 1: https://www.vulnhub.com/entry/ted-1,327/ | |||||
36 | Raven 2: https://www.vulnhub.com/entry/raven-2,269/ | |||||
37 | Potato: https://www.vulnhub.com/entry/potato-1,529/ | |||||
38 | Secure Code 1: https://www.vulnhub.com/entry/securecode-1,651/ | |||||
39 | Pipe: https://www.vulnhub.com/entry/devrandom-pipe,124/ | |||||
40 | ||||||
41 | ||||||
42 | ||||||
43 |