pentest-resources
  • Penetration Testing Resources
  • Repository & File Structure
  • General
    • Resources
      • Link collection
      • Toolkits
      • General guides
      • OSCP experience write-ups
      • Practice resources
    • OS basics
      • Users
        • User info
        • Add low-privilege user
        • Add admin user
        • Change privileges of existing user
        • Delete user
      • Filesystem
        • Find a file / directory
        • File Analysis
        • Services and Autostart
        • CLI tools: grep and friends
      • Network
        • Netcat
        • DNS tools
        • Web tools: curl / wget
    • Python scripting
    • Metasploit
  • Recon
    • Passive Recon
      • OSINT
        • Google operators
    • Active Recon
      • Port Scanning
      • Manual service enumeration
      • Enumeration with system access
  • Vulnerability analysis
    • Standard Ports & Common Services
      • 00 - Service unknown
      • 21 - FTP
      • 22 - SSH
      • 23 - Telnet
      • 25 - SMTP
      • 53 - DNS
      • 69 - TFTP
      • 80 - HTTP
      • 88 - Kerberos
      • 110 - POP3
      • 111 - RPCbind
      • 119 - NTP
      • 135 - MSRPC
      • 139 - SMB
      • 143 - IMAP
      • 161 - SNMP
      • 162 - SNMP
      • 199 - SMUX
      • 389 - LDAP
      • 443 - HTTPS
      • 445 - SMB
      • 554 - RTSP
      • 587 - Outgoing SMTP
      • 631 - CUPS
      • 636 - LDAP
      • 993 - IMAP (secure)
      • 993 - POP3
      • 1433 - MSSQL
      • 1521 - Oracle Database
      • 2049 - NFS
      • 3306 - MySQL
      • 3389 - RDP
      • 5432 - PostgreSQL
      • 5900 - VNC
    • Finding vulnerabilities
  • Gaining access
    • Physical Access
    • Client-side Attacks
    • Web Application Attacks
    • Reverse Shells
    • Common Vulnerabilities
      • MS17-010 - EternalBlue
  • Post Exploitation
    • Restricted Shell Escape
    • Privilege Escalation
      • Scripts & Tools
      • Further Enumeration
    • Persistence
    • Loot
    • Password Cracking
    • Reducing Forensic Evidence
  • Reporting
  • My methodology
    • Example Pentest
    • My Toolkit
      • Software
      • Hardware
Powered by GitBook
On this page
  • VulnHub
  • HackTheBox
  • Other options

Was this helpful?

  1. General
  2. Resources

Practice resources

PreviousOSCP experience write-upsNextOS basics

Last updated 6 years ago

Was this helpful?

VulnHub

VulnHub offers many (free!) VMs containing certain vulnerabilities. Often, reading the walkthroughs after exploiting the machines can be very helpful for the pentesting methodology. Some recommended machines can be found below:

  • Mr-Robot

  • VulnOS

  • SickOS 1 & 2

  • BrainDead

  • Kioptrix

  • Stapler

HackTheBox

HTB is an online platform hosting several capture-the-flag machines. The website has a free and a paid program, both are very useful to practice penetration testing. However, it is a CTF platform and some aspects of that (e.g. ) are not as important in 'real-world' penetration testing as they are in capture-the-flag environments.

Other options

There are many more options to practice penetration testing! A quick google search will bring you a lot closer to your goal :P

steganography