Download ready-to-go vulnerable virtual machines preconfigured for the Box. Turn on and start hacking while scoreboard tracks all flags captured.
How does it work?
What's in the box?
Who is it for?
PEN Testers
Improve their offensive skills, develop new attack strategies, and test new offensive tools/tactics against simulated environments.
System Administrators
Train their defensive security skills, test new defensive tools/tactics, practice incident response handling, and test disaster recovery plans in contained networks.
Security Auditors
Practice audit plans through gap assessment exercises, evidence gathering scenarios, and risk mitigation.
Buy now!
your BOx, ready to ship, ready to play.
We accept VISA, Mastercard, American Express, and Discover. Card payments handled through Stripe.
This is for serious game play. Those who want a simulated corporate environment can host real live scenarios with Windows Active Directory, MsSQL, Exchange, or Linux to create a real-live environment.
What's included:
Preconfigured Machines for download
Vulnerable Network
Ready-to-use Kali Pentesting tool
Network-Ready out of the box
Cheatsheets and Walkthroughs
Specifications:
Memory: 16 GB DDR3 RAM
Disk: 240 GB SSD
Graphics: VGA/HDMI Output
Processor: 2.3 Ghz Intel Celeron
Networking: Gigabit Ethernet
Dimensions: 4.55"L x 4.57H x 2.01"D (115mm x 111mm x 51mm)
Have Questions? Want to know if you can sell your vulnerable machines on our marketplace? Contact us and we'll respond shortly.
About Us
Building your own CTFs at Home requires countless hours of configuring vulnerable machines and setting up hardware. In the past, we spent hours building vulnerable environments, creating story lines, and setting flags. Now we've built a solution where a press of a button will get you entire environments full of vulnerable servers like mail, web, sql, and real-life scenarios too!
We've built a ready-to-practice hacking arena.