<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Wed, 22 Apr 2026 15:19:41 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/latesthackingnewschallenges/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Moria: 1.2 - CTF Hacking Challenge (Vulnhub)]]></title><description><![CDATA[Moria 1.2 is themed around the world of Lords of The Rings. With DHCP enabled we will need to find our target IP address trough net discover or a similar arp based tool. Use nmap command for port enumeration]]></description><link>http://direct.ecency.com/freehackingchallenges/@twr/moria12-ctfhackingchallengevulnhub-babdatry61</link><guid isPermaLink="true">http://direct.ecency.com/freehackingchallenges/@twr/moria12-ctfhackingchallengevulnhub-babdatry61</guid><category><![CDATA[freehackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 17 Nov 2018 12:00:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/hgjbks2vRxviCcTEcQZJDMP7ycru6jvpknK76u9SY49Er9dDrUa5mEomMbTXYeZepry1VQeWQVhUTBLhiHDgcvURJ6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[W1R3S: 1.0.1 - Vulnhub CTF Walkthrough]]></title><description><![CDATA[W1R3S is a vulnerable machine by design meant to help you polish your penetration test skills. On this box you are required to gain root access and read a flag located at /root directory. DHCP is enabled]]></description><link>http://direct.ecency.com/bestw1r3s-101hackingchallenges/@twr/w1r3s101-vulnhubctfwalkthrough-0684kuflcp</link><guid isPermaLink="true">http://direct.ecency.com/bestw1r3s-101hackingchallenges/@twr/w1r3s101-vulnhubctfwalkthrough-0684kuflcp</guid><category><![CDATA[bestw1r3s-101hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 09 Nov 2018 10:30:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72RDGs8eAbHFrr6EfYFGHt4sBF76t4eY6FnztSajbbYxY8pztMY4GecrJDWRczUtscTvnnuJUbPZYr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[MinU: 1 Vulnhub Hacking Challenge Walkthrough]]></title><description><![CDATA[MinU: 1 a boot2root challenge available at Vulnhub. It is based on Ubuntu and has DHCP enabled. In my case the box grabbed the following IP address. 192.168.1.101 To check for services running in this]]></description><link>http://direct.ecency.com/bestminu-1hackingchallenges/@twr/minu1vulnhubhackingchallengewalkthrough-z8f2lkxn0g</link><guid isPermaLink="true">http://direct.ecency.com/bestminu-1hackingchallenges/@twr/minu1vulnhubhackingchallengewalkthrough-z8f2lkxn0g</guid><category><![CDATA[bestminu-1hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Fri, 02 Nov 2018 09:43:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/8SzwQc8j2KJaNXywTd35FmuBgqmH1XbTzf75TEmRcrEVSAAd2g5nM5HKhxRpZ9j17hJcLL2dYhVpCUfcANa8qLAosaDoAYBkpXUNW2zvE4U9LAzcuMg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Temple of Doom: 1 | Vulnhub Hacking Challenge Walkthrough]]></title><description><![CDATA[From my experience,I would rate this cool box posted by 0katz at Vulnhub as intermediate since you are required to think outside the box to hack it. With that in mind lets get started: Note: If DHCP is]]></description><link>http://direct.ecency.com/besttempleofdoom-1hackingchallenges/@twr/templeofdoom1vulnhubhackingchallengewalkthrough-535mz3v221</link><guid isPermaLink="true">http://direct.ecency.com/besttempleofdoom-1hackingchallenges/@twr/templeofdoom1vulnhubhackingchallengewalkthrough-535mz3v221</guid><category><![CDATA[besttempleofdoom-1hackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 27 Oct 2018 13:00:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/ADdPNihJzmPbFsB2Gj3LJkb1g7K6uxVWQ4UDFvxP6gECJ2W3uu1hW48RYrVfe5S53EazCsfri7xPUbT2wXUd4g3ok?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Temple of Doom - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Temple of Doom is a Boot2Root CTF Challenge and is available at Vulnhub. This machine is intended for "Intermediates" and requires a lot of time and good enumeration skills to get root. In this]]></description><link>http://direct.ecency.com/besttempleofdoomhackingchallenges/@twr/templeofdoom-vulnhubctfchallengewalkthrough-6y9vpu0a7w</link><guid isPermaLink="true">http://direct.ecency.com/besttempleofdoomhackingchallenges/@twr/templeofdoom-vulnhubctfchallengewalkthrough-6y9vpu0a7w</guid><category><![CDATA[besttempleofdoomhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Tue, 25 Sep 2018 11:06:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/9vWp6aU4y8kxUsiQNU1QSEqyBVS3nbLPaasLZxPdpH6RSbNaVNYkRJFKhDxA3tNBKXiS8Gz8RwRKwtxJYg4DVxChoThthr9X1EbGEFtHyEx5yZ6uYBYNx3TPwWh7MyP5rFASwZZo7VF6FUnwY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BTRSys - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[BTRSys is a Boot2Root Challenge and is available at Vulnhub. This is a really interesting CTF challenge, especially as its Client Side Restrictions using JavaScript. In this walkthrough, I'll be using]]></description><link>http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/btrsys-vulnhubctfchallengewalkthrough-ji6dtglgrr</link><guid isPermaLink="true">http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/btrsys-vulnhubctfchallengewalkthrough-ji6dtglgrr</guid><category><![CDATA[bestvulnhubhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 23 Sep 2018 02:30:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/4i88GgaV8qiFuCTWkFvuu5WgJLySqUq4Ye72tSsp5JaXxUyES1JT1Vxo8SidJ1wquhcr9aUnsZx31AP8CT2rUHkcz4ZZDLPzPs778kP3b3pAD42Qo57oPKSCW2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Pluck - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Pluck is a Boot2Root CTF Challenge and is available at Vulnhub. This challenge is for "Intermediates" and requires some good enumeration and exploitation skills to get root. In this walkthrough,]]></description><link>http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/pluck-vulnhubctfchallengewalkthrough-5pquq6mrzl</link><guid isPermaLink="true">http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/pluck-vulnhubctfchallengewalkthrough-5pquq6mrzl</guid><category><![CDATA[bestvulnhubhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sat, 22 Sep 2018 19:00:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3SxE1dY1QTU7zGDPmiWvv4r6HWjRBJKPaHukeYjWZoSkUWmT358?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Lin.Security - Vulnhub CTF Challenge Walkthrough]]></title><description><![CDATA[Lin Security is available at Vulnhub. This VM is made for "Beginners" to master Privilege Escalation in Linux Environment using diverse range of techniques. There is no vulnerability in Kernel]]></description><link>http://direct.ecency.com/bestlin-securityhackingchallenges/@twr/linsecurity-vulnhubctfchallengewalkthrough-88snxkloxo</link><guid isPermaLink="true">http://direct.ecency.com/bestlin-securityhackingchallenges/@twr/linsecurity-vulnhubctfchallengewalkthrough-88snxkloxo</guid><category><![CDATA[bestlin-securityhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 16 Sep 2018 12:20:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBPrpKosyNE5GkXfDM8nQbhsa4YVzKuvHCHkvZMC3VEP6XPVomDj1rS6syk5H2ga9VWT8gp6XLNKzoRHs3yB2y9BhNtZf8R9CcTUktjxDQLJCRe1kxCfLz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Sick OS 1.1 - VulnHub CTF Challenge Walkthrough]]></title><description><![CDATA[Sick OS is available at VulnHub. This machine is similar to ones you might see in OSCP labs. This is a challenging and exciting CTF that contains multiple vulnerabilities and privilege escalation vectors.]]></description><link>http://direct.ecency.com/bestsickoshackingchallenges/@twr/sickos11-vulnhubctfchallengewalkthrough-ogm630zwzj</link><guid isPermaLink="true">http://direct.ecency.com/bestsickoshackingchallenges/@twr/sickos11-vulnhubctfchallengewalkthrough-ogm630zwzj</guid><category><![CDATA[bestsickoshackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Wed, 29 Aug 2018 18:12:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/62PdCouTvNPDSo5wavrnZYWhf6NUVUiYs2vVj2RvPXYxqQKVUffSViUCMUAFwxYTZbBpnSZQs9VoQDALCeuM5RhUM8q75ramuo6WCYDLLesjU7p?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BlackLight - VulnHub CTF Challenge Walkthrough]]></title><description><![CDATA[Blacklight is a beginner level CTF challenge. The VM is available at VulnHub. This challenge is very easy and short as compared to other VulnHub Challenges. Import the VM into the Virtualbox and turn on.]]></description><link>http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/blacklight-vulnhubctfchallengewalkthrough-rc81qq6m7w</link><guid isPermaLink="true">http://direct.ecency.com/bestvulnhubhackingchallenges/@twr/blacklight-vulnhubctfchallengewalkthrough-rc81qq6m7w</guid><category><![CDATA[bestvulnhubhackingchallenges]]></category><dc:creator><![CDATA[twr]]></dc:creator><pubDate>Sun, 26 Aug 2018 19:00:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVSSvckhitKsyJtcCwLTjqSmBhyMBbAdbB7op6coF8vWwE3rqYDE2FS6Nic4ig8o3SwnUAbPFQLjahP9NJmPyf1ACCgdGtGtiH75fzvWwByENRmbhkz?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>