<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 22 Apr 2026 06:29:46 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/hackingchallengelhn/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Kioptrix 1.0 - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Kioptrix 1.0 is the first level of the Kioptrix machines CTF challenges. As you can understand this is the easiest challenge to solve. The main focus of this machine is to learn how to use basic enumeration]]></description><link>http://direct.ecency.com/bestkioptrix1-0hackingchallenges/@twr/kioptrix10-vulnhubctfchallengewalkthrough-zdptkb19l6</link><guid isPermaLink="true">http://direct.ecency.com/bestkioptrix1-0hackingchallenges/@twr/kioptrix10-vulnhubctfchallengewalkthrough-zdptkb19l6</guid><category><![CDATA[bestkioptrix1-0hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 28 Dec 2018 17:30:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/hgjbks2vRxviCcTEcQZJDMP7ycru6jvpknK76u9SY49Er9dDrUa5mEomMbTXYeZepry1VQeWQVhUhZQuvrjaRUcnHC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Moria: 1.2 - CTF Hacking Challenge (Vulnhub)]]></title><description><![CDATA[Moria 1.2 is themed around the world of Lords of The Rings. With DHCP enabled we will need to find our target IP address trough net discover or a similar arp based tool. Use nmap command for port enumeration]]></description><link>http://direct.ecency.com/freehackingchallenges/@twr/moria12-ctfhackingchallengevulnhub-babdatry61</link><guid isPermaLink="true">http://direct.ecency.com/freehackingchallenges/@twr/moria12-ctfhackingchallengevulnhub-babdatry61</guid><category><![CDATA[freehackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 17 Nov 2018 12:00:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/hgjbks2vRxviCcTEcQZJDMP7ycru6jvpknK76u9SY49Er9dDrUa5mEomMbTXYeZepry1VQeWQVhUTBLhiHDgcvURJ6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[W1R3S: 1.0.1 - Vulnhub CTF Walkthrough]]></title><description><![CDATA[W1R3S is a vulnerable machine by design meant to help you polish your penetration test skills. On this box you are required to gain root access and read a flag located at /root directory. DHCP is enabled]]></description><link>http://direct.ecency.com/bestw1r3s-101hackingchallenges/@twr/w1r3s101-vulnhubctfwalkthrough-0684kuflcp</link><guid isPermaLink="true">http://direct.ecency.com/bestw1r3s-101hackingchallenges/@twr/w1r3s101-vulnhubctfwalkthrough-0684kuflcp</guid><category><![CDATA[bestw1r3s-101hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 09 Nov 2018 10:30:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72RDGs8eAbHFrr6EfYFGHt4sBF76t4eY6FnztSajbbYxY8pztMY4GecrJDWRczUtscTvnnuJUbPZYr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[MinU: 1 Vulnhub Hacking Challenge Walkthrough]]></title><description><![CDATA[MinU: 1 a boot2root challenge available at Vulnhub. It is based on Ubuntu and has DHCP enabled. In my case the box grabbed the following IP address. 192.168.1.101 To check for services running in this]]></description><link>http://direct.ecency.com/bestminu-1hackingchallenges/@twr/minu1vulnhubhackingchallengewalkthrough-z8f2lkxn0g</link><guid isPermaLink="true">http://direct.ecency.com/bestminu-1hackingchallenges/@twr/minu1vulnhubhackingchallengewalkthrough-z8f2lkxn0g</guid><category><![CDATA[bestminu-1hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 02 Nov 2018 09:43:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJaNXywTd35FmuBgqmH1XbTzf75TEmRcrEVSAAd2g5nM5HKhxRpZ9j17hJcLL2dYhVpCUfcANa8qLAosaDoAYBkpXUNW2zvE4U9LAzcuMg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Temple of Doom: 1 | Vulnhub Hacking Challenge Walkthrough]]></title><description><![CDATA[From my experience,I would rate this cool box posted by 0katz at Vulnhub as intermediate since you are required to think outside the box to hack it. With that in mind lets get started: Note: If DHCP is]]></description><link>http://direct.ecency.com/besttempleofdoom-1hackingchallenges/@twr/templeofdoom1vulnhubhackingchallengewalkthrough-535mz3v221</link><guid isPermaLink="true">http://direct.ecency.com/besttempleofdoom-1hackingchallenges/@twr/templeofdoom1vulnhubhackingchallengewalkthrough-535mz3v221</guid><category><![CDATA[besttempleofdoom-1hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 27 Oct 2018 13:00:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/ADdPNihJzmPbFsB2Gj3LJkb1g7K6uxVWQ4UDFvxP6gECJ2W3uu1hW48RYrVfe5S53EazCsfri7xPUbT2wXUd4g3ok?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lampião: 1 Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Lampião 1 is a unique challenge available at Vulnhub. The box was created for beginners. As usual, let’s find the IP address of the box using arp-scan -l: Great, we now have a list of all hosts. Now we]]></description><link>http://direct.ecency.com/bestlampiao-1hackingchallenges/@twr/lampio1vulnhubctfchallengewalkthrough-okqz5bw0ll</link><guid isPermaLink="true">http://direct.ecency.com/bestlampiao-1hackingchallenges/@twr/lampio1vulnhubctfchallengewalkthrough-okqz5bw0ll</guid><category><![CDATA[bestlampiao-1hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 26 Oct 2018 09:39:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/ADdPNihJzmPbFsB2Gj3LJkb1g7K6uxVWQ4UDFvxP6gECJ2W3uu1hW48RYrVfe5S53EazCsfri7xPUbT2iSUaB8cNa?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Temple of Doom - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Temple of Doom is a Boot2Root CTF Challenge and is available at Vulnhub. This machine is intended for "Intermediates" and requires a lot of time and good enumeration skills to get root. In this]]></description><link>http://direct.ecency.com/besttempleofdoomhackingchallenges/@twr/templeofdoom-vulnhubctfchallengewalkthrough-6y9vpu0a7w</link><guid isPermaLink="true">http://direct.ecency.com/besttempleofdoomhackingchallenges/@twr/templeofdoom-vulnhubctfchallengewalkthrough-6y9vpu0a7w</guid><category><![CDATA[besttempleofdoomhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 25 Sep 2018 11:06:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/9vWp6aU4y8kxUsiQNU1QSEqyBVS3nbLPaasLZxPdpH6RSbNaVNYkRJFKhDxA3tNBKXiS8Gz8RwRKwtxJYg4DVxChoThthr9X1EbGEFtHyEx5yZ6uYBYNx3TPwWh7MyP5rFASwZZo7VF6FUnwY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BTRSys - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[BTRSys is a Boot2Root Challenge and is available at Vulnhub. This is a really interesting CTF challenge, especially as its Client Side Restrictions using JavaScript. In this walkthrough, I'll be using]]></description><link>http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/btrsys-vulnhubctfchallengewalkthrough-ji6dtglgrr</link><guid isPermaLink="true">http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/btrsys-vulnhubctfchallengewalkthrough-ji6dtglgrr</guid><category><![CDATA[bestvulnhubhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 23 Sep 2018 02:30:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFuCTWkFvuu5WgJLySqUq4Ye72tSsp5JaXxUyES1JT1Vxo8SidJ1wquhcr9aUnsZx31AP8CT2rUHkcz4ZZDLPzPs778kP3b3pAD42Qo57oPKSCW2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Pluck - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Pluck is a Boot2Root CTF Challenge and is available at Vulnhub. This challenge is for "Intermediates" and requires some good enumeration and exploitation skills to get root. In this walkthrough,]]></description><link>http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/pluck-vulnhubctfchallengewalkthrough-5pquq6mrzl</link><guid isPermaLink="true">http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/pluck-vulnhubctfchallengewalkthrough-5pquq6mrzl</guid><category><![CDATA[bestvulnhubhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 22 Sep 2018 19:00:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3SxE1dY1QTU7zGDPmiWvv4r6HWjRBJKPaHukeYjWZoSkUWmT358?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lin.Security - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Lin Security is available at Vulnhub. This VM is made for "Beginners" to master Privilege Escalation in Linux Environment using diverse range of techniques. There is no vulnerability in Kernel]]></description><link>http://direct.ecency.com/bestlin-securityhackingchallenges/@twr/linsecurity-vulnhubctfchallengewalkthrough-88snxkloxo</link><guid isPermaLink="true">http://direct.ecency.com/bestlin-securityhackingchallenges/@twr/linsecurity-vulnhubctfchallengewalkthrough-88snxkloxo</guid><category><![CDATA[bestlin-securityhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 16 Sep 2018 12:20:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBPrpKosyNE5GkXfDM8nQbhsa4YVzKuvHCHkvZMC3VEP6XPVomDj1rS6syk5H2ga9VWT8gp6XLNKzoRHs3yB2y9BhNtZf8R9CcTUktjxDQLJCRe1kxCfLz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Sick OS 1.1 - VulnHub CTF Challenge Walkthrough]]></title><description><![CDATA[Sick OS is available at VulnHub. This machine is similar to ones you might see in OSCP labs. This is a challenging and exciting CTF that contains multiple vulnerabilities and privilege escalation vectors.]]></description><link>http://direct.ecency.com/bestsickoshackingchallenges/@twr/sickos11-vulnhubctfchallengewalkthrough-ogm630zwzj</link><guid isPermaLink="true">http://direct.ecency.com/bestsickoshackingchallenges/@twr/sickos11-vulnhubctfchallengewalkthrough-ogm630zwzj</guid><category><![CDATA[bestsickoshackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 29 Aug 2018 18:12:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/62PdCouTvNPDSo5wavrnZYWhf6NUVUiYs2vVj2RvPXYxqQKVUffSViUCMUAFwxYTZbBpnSZQs9VoQDALCeuM5RhUM8q75ramuo6WCYDLLesjU7p?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BlackLight - VulnHub CTF Challenge Walkthrough]]></title><description><![CDATA[Blacklight is a beginner level CTF challenge. The VM is available at VulnHub. This challenge is very easy and short as compared to other VulnHub Challenges. Import the VM into the Virtualbox and turn on.]]></description><link>http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/blacklight-vulnhubctfchallengewalkthrough-rc81qq6m7w</link><guid isPermaLink="true">http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/blacklight-vulnhubctfchallengewalkthrough-rc81qq6m7w</guid><category><![CDATA[bestvulnhubhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 26 Aug 2018 19:00:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3SwnUAbPFQLjahP9NJmPyf1ACCgdGtGtiH75fzvWwByENRmbhkz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Toppo - VulnHub CTF Challenge Walkthrough]]></title><description><![CDATA[Toppo is beginner level CTF and is available at VulnHub. Getting the first shell and then root, both are very easy. Throughout the walkthrough, I'll be using Parrot Security OS. Turn on the machine and]]></description><link>http://direct.ecency.com/ctflhn/@twr/toppo-vulnhubctfchallengewalkthrough-aida0qomre</link><guid isPermaLink="true">http://direct.ecency.com/ctflhn/@twr/toppo-vulnhubctfchallengewalkthrough-aida0qomre</guid><category><![CDATA[ctflhn]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 24 Aug 2018 13:30:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQstst1uynghrX8KfVsMRABQCve2x2UaAUpxsPn7jyc4XP8J9QBASmBnx1T7skRfJUpLUZBzQmMWCir7nUvHmSghm3CFGfRBGBFTAFBuYW2PTexGURqisti?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Basic Pentesting 1 - VulnHub CTF Challenge Walkthrough]]></title><description><![CDATA[Basic Pentesting 1 is available at VulnHub. Its difficulty level is "Easy". This machine has no flags and sadly lacks CTF flavor. It contains multiple Remote and Privilege Escalation Vulnerabilities.]]></description><link>http://direct.ecency.com/ctfhacksolutions/@twr/basicpentesting1-vulnhubctfchallengewalkthrough-2a19mv2ks1</link><guid isPermaLink="true">http://direct.ecency.com/ctfhacksolutions/@twr/basicpentesting1-vulnhubctfchallengewalkthrough-2a19mv2ks1</guid><category><![CDATA[ctfhacksolutions]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Mon, 20 Aug 2018 16:31:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/2YRZBi4FZVHeXL7n7YbBjpQ6NM6KhL7QJpmn4BVBcXuzwD3YsLzYLQ18XdxyQmUT5M9rJYWDQqTwwkEGxfGRH6u9CThzkdGMYKg?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>