The vulnerable virtual machine was created for a university project. Its purpose is to provide a realistic and challenging environment for practicing penetration testing. The VM is based on Ubuntu Server 20.04 LTS 64-bit and runs several services, some of which contain hidden vulnerabilities that can be exploited for local access. Additionally, the VM offers multiple methods for a local user to escalate their privileges and gain root access.
There are three distinct paths (
The VM is available for download from Google Drive at the following link: Download VM
- Import the VM into VirtualBox virtualization software.
- Set the network interface of both the VM and the attacker’s machine to "NAT Network", ensuring they are on the same LAN and can communicate with each other. Here’s how to do it:
- Open VirtualBox and select the VM (and the attacker’s machine if applicable) from the list.
- Click on Settings in the top menu.
- Go to the Network tab.
- On Adapter 1, make sure the adapter is enabled (Enable Network Adapter).
- In the dropdown next to "Attached to", select "NAT Network".
- If no NAT Network exists, click the icon next to the dropdown menu to create a new NAT Network. Set a name and confirm. You should end up with something like this:
- Make sure to repeat these steps for both the vulnerable VM and the attacker’s machine, so they are connected to the same network.
- Turn on the machine and start hacking!
For a detailed design and exploitation guide, refer to the VM Design Report and Writeup.