VulnHub — NULLBYTE: 1 — Part 1


Codename: NB0x01


Objetcive: Get to /root/proof.txt and follow the instructions.

Level: Basic to intermediate.

Description: Boot2root, box will get IP from dhcp, works fine with virtualbox&vmware.

Hints: Use your lateral thinking skills, maybe you’ll need to write some code.


Step1. 首先準備攻擊機跟靶機,並設置NAT。

Step2. 透過下方指令得知網段在

sudo ifconfig

Step3. 利用netdiscover掃描網段

sudo netdiscover -r

Step4. 可疑的有2.3與2.15,以nmap掃描這幾個IP。

nmap -sV

Step5. 發現80port 有開,顯然有個Web Server!





NTUT CSIE | Biomedical Informatics Lab | |

Love podcasts or audiobooks? Learn on the go with our new app.

Creating Enemy Explosions

Client Side Rendering vs Server Side Rendering

Immer — Javascript Immutability the happy way

React, Don’t Let Meta Developers Down

What I learned at React Finland Workshop with Nik Graf

Missing part of Redux Saga Experience

React Series - 2. React Structures and Syntax

Java method parameter example code

Writing a “Hello World” NodeJS / Express Web App

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


NTUT CSIE | Biomedical Informatics Lab | |

More from Medium

CVE-2021–40444 Microsoft MSHTML Remote Code Execution Exploit

G511 Review from Microcenter and trying to figure out some way to get into an old user account on a…

How to Configure Nutanix VMware Cluster Field Installation — Part 5 — ICT Fella

Port Knocking