0x00 前言
在学习渗透测试的过程中,光学理论知识是不够的,还需要结合实战来进行学习。但是国家法律是不允许我们对互联网上的web站在未授权的情况下进行渗透测试的,所以我们只能通过自己搭建环境来进行学习。下面给大家分享一些靶场,免得大家再去寻找。
0x01 Vulnerable Web Applications
0x02 Vulnerable Operating System Installations
0x03 Sites for Downloading Older Versions of Various Software
Exploit-DB | http://www.exploit-db.com/ |
---|---|
Old Apps | http://www.oldapps.com/ |
Old Version | http://www.oldversion.com/ |
VirtualHacking Repo | sourceforge.net/projects/virtualhacking/files/apps%40realworld/ |
0x04 Sites by Vendors of Security Testing Software
Acunetix acuforum | http://testasp.vulnweb.com/ |
---|---|
Acunetix acublog | http://testaspnet.vulnweb.com/ |
Acunetix acuart | http://testphp.vulnweb.com/ |
Cenzic crackmebank | http://crackme.cenzic.com |
HP freebank | http://zero.webappsecurity.com |
IBM altoromutual | http://demo.testfire.net/ |
Mavituna testsparker | http://aspnet.testsparker.com |
Mavituna testsparker | http://php.testsparker.com |
NTOSpider Test Site | http://www.webscantest.com/ |
0x05 Sites for Improving Your Hacking Skills
0x06 CTF Sites / Archives
CAPTF Repo | http://captf.com/ |
---|---|
CTFtime (Details of CTF Challenges) | http://ctftime.org/ctfs/ |
CTF write-ups repository | https://github.com/ctfs |
Reddit CTF Announcements | http://www.reddit.com/r/securityctf |
shell-storm Repo | http://shell-storm.org/repo/CTF/ |
VulnHub | https://www.vulnhub.com |
0x07 Mobile Apps
Damn Vulnerable Android App (DVAA) | https://code.google.com/p/dvaa/ |
---|---|
Damn Vulnerable FirefoxOS Application (DVFA) | https://github.com/pwnetrationguru/dvfa/ |
Damn Vulnerable iOS App (DVIA) | http://damnvulnerableiosapp.com/ |
ExploitMe Mobile Android Labs | http://securitycompass.github.io/AndroidLabs/ |
ExploitMe Mobile iPhone Labs | http://securitycompass.github.io/iPhoneLabs/ |
Hacme Bank Android | http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx |
InsecureBank | http://www.paladion.net/downloadapp.html |
NcN Wargame | http://noconname.org/evento/wargame/ |
OWASP iGoat | http://code.google.com/p/owasp-igoat/ |
OWASP Goatdroid | https://github.com/jackMannino/OWASP-GoatDroid-Project |
0x08 Lab
binjitsu | https://github.com/binjitsu/binjitsu |
---|---|
CTFd | https://github.com/isislab/CTFd |
Mellivora | https://github.com/Nakiami/mellivora |
NightShade | https://github.com/UnrealAkama/NightShade |
MCIR | https://github.com/SpiderLabs/MCIR |
Docker | https://www.docker.com/ |
Vagrant | https://www.vagrantup.com/ |
NETinVM | http://informatica.uv.es/~carlos/docencia/netinvm/ |
SmartOS | https://smartos.org/ |
SmartDataCenter | https://github.com/joyent/sdc |
vSphere Hypervisor | https://www.vmware.com/products/vsphere-hypervisor/ |
GNS3 | http://sourceforge.net/projects/gns-3/ |
OCCP | https://opencyberchallenge.net/ |
XAMPP | https://www.apachefriends.org/index.html |
0x09 Miscellaneous
VulnVPN | http://www.rebootuser.com/?page_id=1041 |
---|---|
VulnVoIP | http://www.rebootuser.com/?page_id=1041 |
Vulnserver | http://www.thegreycorner.com/2010/12/introducing-vulnserver.html |
NETinVM | http://informatica.uv.es/~carlos/docencia/netinvm/ |
DVRF | https://github.com/praetorian-inc/DVRF |
HackSys Extreme Vulnerable Driver | http://www.payatu.com/hacksys-extreme-vulnerable-driver/ |
VirtuaPlant | https://github.com/jseidl/virtuaplant |
Fosscomm | https://github.com/nikosdano/fosscomm |
Morning Catch | http://blog.cobaltstrike.com/2014/08/06/introducing-morning-catch-a-phishing-paradise/ |
AWBO | https://labs.snort.org/awbo/awbo.html |