This two-virtual machine environment is designed to be a general-purpose network penetration testing, attack/defense training environment. It consists of a Kali Linux pen-testing VM ([login to view URL]) as well as a vulnerable target system running Windows 7(64bit) VM ([login to view URL]) residing on a dedicated /20 "network bubble" in the cloud. It features proxied web access for allowing indirect web file downloads, webmail, and even Google drive or student LMS use, but cannot directly send any packets outside its own network bubble, i.e., no external ping/ICMP, traceroute, or even external DNS server queries can be used to get "out of the Range." The environment can be used safely with many of the Range's predefined pen-testing labs, as well as free form network scanning, DoS/pen-testing, red team/blue team capture the flags, client/server sniffing, and general attack/defense classes or testing. NOTE: The version of Windows in this environment is older and more vulnerable by design, and should not be used for teaching current Windows systems IT training or OS patching best practices; more modern Windows 10 VMs should be used in that case. The login username/password on each VM is student/student. For root or admin access, use "sudo su -" on Kali, and "Run As Administrator" on Windows.
Hi,
I have over 6 years experience On it And Understand That You are looking for a Linux developer , And I can I am available immediately to start For you .
Please read my recent jobs and see the 100% success rate.
Thanks a lot .
Hey there, I have 4 years of working experience in web technologies and I have a strong working knowledge of every possible framework which is in the market.
In terms of client-end I know: Ubuntu, System Admin, Web Security, Network Administration and Linux
Also I have done tons of work on freelancing career. I am waiting anxiously for a positive response from your side. And I have read your requirements as well.
Thanks and regards,
Awais
Hi There,
I have 3+ years of experience in penetration testing including Web Application penetration testing; System Application penetration testing; Mobile application penetration testing; Network application penetration testing; social engineering penetration testing etc. I have reached GURU rank in hackthebox and won lots of CTF competitions. After gone through the document , I can see that you have boot2root machine where we need to get the root flag to complete the challenge. I can assure you that I will be an ideal candidate for what you are looking for. Please out to me for further discussions.
Thank you
Angu Hari
Hello,
Checking your requirements we found ourselves fit to proceed with this project. We are very much confident that we can achieve and fulfill all the project needs.
with our efforts.
Before start workings I would like to have a detailed discussion with you on this project in order to clarify the specifications better as i have some queries also. Kindly initiate me on chat to make a live conversation.
Profile:
https://www.freelancer.com/u/devjoneshere
Hello there.
I am good expert linux and windows c/c++ programming developer.
So can handle this kind of project.
However i don't well requirement of this project.
So hope more discuss with you.
Regards.