Virtual Vulnerable Linux Machine for Penetration Testing and Exploitation

• This Linux Virtual Machine is designed with several vulnerabilities that includes ports obfuscation configurations , architecture based on real scenarios , altered/hindered shells, privilege escalations etc.
• Remote Exploitation, misconfiguration of Kernel/OS, SSH entry point, samba shares, steganography etc. are also defined in a complete Linux environment.

#𝗨𝗽𝗱𝗮𝘁𝗲𝗱 𝗛𝗮𝘀𝗵𝗲𝘀 𝗼𝗳 𝘁𝗵𝗶𝘀 𝗩𝗠

𝗦𝗛𝗔-𝟮𝟱𝟲: 2890857261b56cfd0435b33ddfe3fdf43a9773e7f12485220f1cbf43719b71d7
𝗠𝗗𝟱: f27a0cab21ec69f92afb260bc06b6d25

This machine is also deployed on 𝗧𝗿𝘆𝗛𝗮𝗰𝗸𝗠𝗲 which has crossed 𝟴𝟰𝟬+ views
=> TryHackMe | Login

#The name - 𝗛𝗲𝗮𝗱𝗹𝗲𝘀𝘀