This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
guides:cybersecurity [2021/10/02 20:09] razvan [Wargames] Add CTFLearn |
guides:cybersecurity [2021/10/02 20:36] (current) razvan [Wargames] Add section on vulnerable boxes |
||
---|---|---|---|
Line 58: | Line 58: | ||
Also look at [[https:// | Also look at [[https:// | ||
+ | |||
+ | ===== Vulnerable Boxes ===== | ||
+ | |||
+ | A more complex set of challenges figures an entire virtual machine that you have to exploit. | ||
+ | The virtual machine usually has a realistic setup with a vulnerability (or more) that you have to discover. | ||
+ | The virtual machine has to either be downloaded or it is accessible online. | ||
+ | |||
+ | These challenges are more difficult as they generally require you to go through all steps of a cybersecurity attack: reconnaissance, | ||
+ | This also makes them more realistic, so it's important you take a look on those. | ||
+ | |||
+ | [[https:// | ||
+ | It provides learning-centered " | ||
+ | All items are centered around remotely accessible virtual machines (via a VPN connection). | ||
+ | |||
+ | Another place to look into is [[https:// | ||
+ | VulnHub is a community repository of vulnerable virtual machines. | ||
+ | Community members create and make available virtual machines on the VulnHub website. | ||
+ | Virtual machines have to be downloaded and installed and exploited locally. | ||
+ | As a community-centered repository, VulnHub has a large set of vulnerable boxes you can toy around with. | ||
+ | |||
+ | [[https:// | ||
+ | Hack the Boxes is a more business-oriented organization, | ||
+ | Virtual machines are already deployed and you can access remotely via a VPN connection. | ||
===== CTFs ===== | ===== CTFs ===== |