This is practice VM for malware development.
This VM provides practice challenges for malware development just like ctf challenges. VM also comes with .NET framework installed incase if you want to use c# for malware development.
- Use the link here to download the VM, it's around 21gb in size
- Use this Onedrive link here incase the google drive link does not work
- Download the .ova file
- Open it with virtual box or vmware workstation
- Give the VM a name and power on the machine
- Set network adapter settings to bridged so we can scan for ip address using nmap
- Use nmap or any other ip scanner tools to scan the ip address of the VM, eg: nmap -sn ourkaliip/24 to retrieve all other active hosts on our network
- Go to your browser and open http://IP_ADDRESS_OF_VM:5000
- You can see the challenges, write the code in c/c++/rust/c# or any other language and upload the binary to get the flag
- Take a snapshot of the VM so that you can revert back to the original state if anything error happens
- If the server does not run automatically, login to the vm and run these commands from cmd as administrator
cd "C:\Users\flash\Desktop\myserver\myserver"
python main.py
Credentials for the users are flash:flash and arrow:arrow