LazySysAdmin Vulnerable Machine Walk-through

WX6k7NJtA8gfk*w5J3&T@*Ga6!0o5UP89hMVEQ#PT9851 - LazySysAdmin Proof/Flag

LazySysAdmin is a vulnerable machine available on It’s a relatively easy machine, and shouldn’t prove to be too hard for most beginner-intermediate people. Enumerating LazySysAdmin I began enumeration with a simple nmap scan. The Red Team Field Manual is a great reference for tools like nmap. nmap Starting Nmap 7.60 ( ) … Read more

Quaoar Vulnerable-Machine Walkthrough

Hacking the Quaoar vulnerable machine, available on

Quaoar is a vulnerable virtual-machine available on It is designed with beginners in mind, and doesn’t require the use of any advanced exploitation techniques. ENUMERATION I already knew Quaoar’s IP address(, as it is displayed when the machine initially boots up. So I began with a standard nmap scan to see what services the … Read more

“Mr. Robot” VulnHub VM Writeup

Mr. Robot is a Linux-based vulnerable machine available on According to the author, the machine has three hidden flags which get progressively harder to find. Mr. Robot is considered beginner/intermediate level, and doesn’t require any advanced exploitation techniques to conquer. ENUMERATION The Mr. Robot VM is running on a host-only adapter/network of The … Read more

“Stapler” Vulnhub VM Writeup

In this walkthrough we will cover reconnaissance, enumeration, and exploitation of the “Stapler” vulnerable-machine from VulnHub. According to the author, this machine has multiple ways to gain limited shells and root access – so don’t assume this was the only way to root this machine. INFORMATION GATHERING I’m running Stapler on VirtualBox with a host-only … Read more