CEH v11 - Vulnerable Machine used by
-
Hello,
I'm really liking the CEH v11 course! Besides the LABs we have available, I would like to ask @David what is the vulnerable machines he is using during the "live" enumerations as would be nice to go the extra mile as he's doing on the real life usage.
Thank you again for the excellent content provided here!
-
Greetings, @fabio-teles
If I'm remembering correctly, I used....
bee-box
https://sourceforge.net/projects/bwapp/files/bee-box/
Websploit2018
https://www.vulnhub.com/entry/websploit2018-1,253/
Metasploitable2
https://sourceforge.net/projects/metasploitable/files/latest/download
Those are the appliances I typically use, there may be others, or my own custom machines, but those are mostly used.
I hope that helps you!
Daniel -
Hello @daniel-lowrie87 - thank you so much for your answer! The Metasploitable2 I found on the videos and some of the scans, but forgot about the other two - for sure will help to add to the "stock" of vulnerable devices!
Thank you again for your time and excellent details on the CEH course!