Metasploitable 3
Security research, CTF writeups, and hacking adventures
💀 Metasploitable 3 Writeups
Comprehensive walkthroughs of the Rapid7 Metasploitable 3 CTF — a vulnerable Windows VM with card-themed flags and various exploitation paths.
### 🃏 Card Challenges
Finding the hidden flags — each card is a different vulnerability to exploit.
- The Joker: Starting CTF - Metasploitable 3 December 05, 2016
- The King of Hearts December 05, 2016
- The King of Diamonds (damonds??) December 05, 2016
- The Queen of Hearts December 05, 2016
- The Jack of Clubs December 08, 2016
- The Ten of Diamonds December 08, 2016
- The Ace of Hearts December 08, 2016
- The Seven of Spades December 11, 2016
- Metasploitable 3 - Broken flags (cards) December 16, 2016
- The Three of Spades January 03, 2017
- The Six of Diamonds January 04, 2017
- Jack of Diamonds - Broken flag and how to fix it January 05, 2017
- The Four of Clubs January 06, 2017
- The Jack of Hearts January 06, 2017
- The Seven of Hearts January 07, 2017
- The King of Clubs January 07, 2017
### 💣 Exploitation Guides
Deep dives into specific services and exploitation techniques.
- Metasploitable 3 - ManageEngine DesktopCentral 9 January 11, 2017
- Metasploitable 3 - Hashdump without Authentication January 13, 2017
- Metasploitable 3 - Hashdump post Authentication January 16, 2017
- Metasploitable 3 - Exploiting Tomcat January 21, 2017
### 🔍 Vulnerability Scanning
Scanning and assessment of the Metasploitable 3 environment.
- Metasploitable 3 - OpenVAS Vulnerability Scan February 03, 2017