Skip to content

Using vultest

redsloop edited this page Feb 9, 2020 · 41 revisions

There are two modes to execute: batch and interactive.

Default Host configuration for vulnerable environments

  • username: vagrant
  • password: vagrant
  • IP address: 192.168.177.177

Batch execution

Local attack, CVE-2014-1318 as an example

Local attack, CVE-2014-1318

Remote attack, CVE-2019-0708 as an example

Remote attack, CVE-2019-0708


Interactive execution

Launch vultest

スクリーンショット 2019-11-22 14 10 44

Remote attack, CVE-2014-6271 as an example

Before the test, you need to start a host to carry out an attack. Currently, only Metasploit is supported as an attack tool. We recommend Kali Linux, as a virtual machine if desired.

Let's say IP address of the attack host is 192.168.57.77.

Remote attack CVE-2014-6271

Local attack, CVE-2015-1318 as an example

Local attack, CVE-2015-1318

Report the test

Report CVE-2014-6271

Clone this wiki locally