Live Application https://vulnerable-box-resources.infosecwarrior.com
Vulnerable Box Resources is a curated collection of scan outputs and data designed to help you analyze and exploit vulnerable machines. This repository provides detailed insights into the inner workings of your target systems, making it easier to identify potential security gaps, weaknesses, and attack vectors.
-
Nmap Port Scanning: Gain detailed insights into open ports, running services, and potential security weaknesses on the target machine.
-
Directory Bruteforcing: Uncover hidden directories and files on web servers using tools like
dirsearch
, revealing potential entry points and misconfigurations. -
Web Technology Identification: Identify technologies used by the target website using tools like
whatweb
. -
Vulnerability Scanners: Scanning results from tools like
nikto
andnuclei
to identify known vulnerabilities, misconfigurations, and security flaws in web applications.
To contribute your scan data to this repository, please follow these steps:
-
Run the Scanning Script: Visit the Box Scanning Script repository to download the scanning script and follow the installation instructions provided.
-
Install and Execute the Script: Once you have the script, run it using the following command. Replace
<target_ip>
with your target machine's IP address and<box-name-prefix>
with your desired directory and filename prefix:python box-scan.py -t <target_ip> -o <box-name-prefix>
-
Submit Your Scanning Results: Once the script completes scanning, follow these steps to submit your data:
- Fork the Repository: Fork the Vulnerable Box Resources repository to your GitHub account.
- Create a New Directory: If your target box is from platforms like
InfosecWarrior
,VulnHub
, orHackTheBox
, create a new directory under the respective folder (e.g.,Infosecwarrior
,Vulnhub
,Hack-The-Box
). If it belongs to a different platform, create a directory under theOther
folder. Name the directory after the target machine (e.g.,Box-Name
), and upload all scan data to this folder.
-
Get the Raw Link of Your Nmap Scan File: Navigate to the directory you created, and copy the raw link of your
{box-name-prefix}-nmap-version-scan-output.xml
file.Example format:
https://raw.githubusercontent.com/InfoSecWarrior/Vulnerable-Box-Resources/refs/heads/main/{Resource}/{Machine-Name}/{output_directory_prefix}-nmap-version-scan-output.xml
-
Modify the Username in the URL: Replace
your-github-username
withInfoSecWarrior
in the raw link.For example:
https://raw.githubusercontent.com/InfoSecWarrior/Vulnerable-Box-Resources/refs/heads/main/Infosecwarrior/Wordpress-Host-Server-1/Wordpress_host_server_1-nmap-version-scan-output.xml
-
Update the Raw-File-Links.txt: Open the
{Resource}-Raw-File-Links.txt
file in the repository and add the modified URL of your Nmap scan file. -
Create a Pull Request: After making all necessary changes, go to your forked repository, navigate to "Pull Requests," and select "New Pull Request."