Hey folks ! Today I’m going to write a complete write-up for Zday VM created by sml on HackMyVm. It’s hard level machine, but if you know how things works then it will be easy for you. Lets get started.

The IP address was displayed on the login of the VM, which is great and we don’t need to run netdiscover to find the IP address of the VM

The IP address is 192.168.1.3, After that I fired Nmap to get the list of open ports.


Hey folks!! Today I’m going to solve another boot2root challenge HackSudo 1 created by vishal Waghmare. There is no description about this VM, but I’ll rate this VM as super easy. here is the link below to download the vm: https://www.vulnhub.com/entry/hacksudo-1,650/

┌──(hacker㉿kali)-[~]
└─$ sudo netdiscover -i wlan0

With the help of netdiscover command I got the IP address of my target machine which is 192.168.1.7.


Hey there! Today I’m going to solve another boot2root challenge MoneyBox:1 created by Kirthik_T. This is an easy box with 3 flags in it. Without any further a do let’s jump right into it.

For target discover I use netdiscover command.

┌──(hacker㉿kali)-[~]
└─$ netdiscover -i wlan0

From the above results I got the IP address of our target machine which is 192.168.1.4

Nmap result shows that there are three ports are open. ftp, ssh, and web. Anonymous access is allowed in ftp shown in the nmap result.


Hey there! Today I have an amazing beginner-friendly vulnhub box ‘gaara’ created by 0xJin. It took hardly 10 min to root this machine, but I like it.

1.) Target Discovery with Nmap

With the help of Nmap, I got the IP address which is 192.168.1.149

2.) Port Scanning with Nmap


A perfect CTF challenge for beginner. This challenge is based on Rick and Morty theme. I had so much fun while solving it. It’s a very easy challenge ,so without any further ado lets start hacking .

As this challenge is to exploit the web application and gain shell so i didn’t use nmap to scan ports I directly jumped on the web. On the web I got a page where ‘Rick’ left a message for ‘Morty’ to help him.


Hey folks !! Today I have another boot2root challenge to solve named as odin. odin 1 is an easy level virtual machine created by ‘Bjorn’ ,So without any further ado lets start hacking.

here is the link to downlaod this VM: -https://www.vulnhub.com/entry/odin_1,619/

‘# netdiscover -i wlan0’

The ip address our target machine is ‘192.168.1.8’

before starting, don’t forget to enter the ip address in your /etc/hosts as ‘odin’

example: 192.168.1.8 odin

‘# nmap -ST -p- -vv 192.168.1.8’


Hey folks ! today I have another boot2root challenge “HOGWARTS: BELLATRIX” created by “BLY” . It’s a intermediate box and here is the link where you can downlaod this VM:-https://www.vulnhub.com/entry/hogwarts-bellatrix,609/

‘# netdiscover -i wlan0’

The ip address of the target VM is ‘192.168.1.7’

‘# nmap -sTV -p- 192.168.1.7’


Hey folks! dobby , another boot2root challenge and a easy box created by Hogwarts. here is the link to download this VM:- https://www.vulnhub.com/entry/hogwarts-dobby,597/

‘# netdiscover -i wlan0’

The ip address of target VM is ‘192.168.1.8’ .

As many VMs have port 80 running on them so I directly jumped on the web browser without nmap scan to check is their any web service running on the VM ??

And yes we have a web service running on this VM, but it is a default apache page.


Hey folks! Kb_vuln 3 is the third installment of the KB series on the vulnhub and today I’m going to solve this VM created by ‘machineboy’ . It’s an easy box and here is the link where you can download this VM link:- https://www.vulnhub.com/entry/kb-vuln-3,579/

1.) Target Discovery

‘# netdiscover -i wlan0’

the target ip address is ‘192.168.1.3’.

2.) Port Scanning and Service Detection

‘#nmap -sTV -p- 192.168.1.3’


Hey folks! today we have a boot2root challenge ‘M87: 1’ it’s a vulnhub VM created by ‘mindsflee’. It’s a easy box and here is the link where you can download this VM link:-https://www.vulnhub.com/entry/m87-1,595/

1.) Target Discovery

‘# netdiscover -i wlan0’

with netdiscover tool we get the ip address of our vm which is ‘192.168.1.4’

2.) Port Scanning and Service Detection

‘# nmap -sTV -p- 192.168.1.4’

Sarthak joshi

twitter :- @Exploiter_21

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store