Linux
![Card image cap](https://stoeps.de/posts/2024/chemnitzer-linuxtage/chemnitzer-linuxtage-entrance_hufc5b00a165da47aff48ad2fafc68897b_720767_350x175_fill_q75_box_smart1.jpg)
This year marked my inaugural attendance at the Chemnitzer Linuxdays. The experience was fantastic, and I had the pleasure of connecting with numerous intriguing individuals. Chemnitzer Linuxdays stands out as one of the premier events in the Linux and open-source community. With 3,200 attendees this year, participants had the opportunity to engage with a diverse array of topics through 94 talks and hands-on workshops .
![Aaron Burden: Fountain pen and a notebook](https://stoeps.de/images/list-featured.jpg)
Original Description
DC-3 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.
Last Update: Read in about 8 min
![Aaron Burden: Fountain pen and a notebook](https://stoeps.de/images/list-featured.jpg)
Original Description
Much like DC-1, DC-2 is another purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.
Last Update: Read in about 8 min
![Aaron Burden: Fountain pen and a notebook](https://stoeps.de/images/list-featured.jpg)
Original Description
DC-1 is a purposely built vulnerable lab for the purpose of gaining experience in the world of penetration testing.
It was designed to be a challenge for beginners, but just how easy it is will depend on your skills and knowledge, and your ability to learn.
Last Update: Read in about 5 min
![Aaron Burden: Fountain pen and a notebook](https://stoeps.de/images/list-featured.jpg)
- djinn:1 is the next machine I want to break in.
- Level: Beginner-Intermediate
- flags: user.txt and root.txt
- Format: Virtual Machine (Virtualbox - OVA)
- Operating System: Linux
Last Update: Read in about 13 min
![Aaron Burden: Fountain pen and a notebook](https://stoeps.de/images/list-featured.jpg)
In my spare time I like doing CTF (Capture the flag) or solving machines posted at Vulnhub . This time I started Christmas vacation with Me and My Girlfriend: 1 .
Extracting and importing into Vmware Workstation was straight forward, after the start we need to find the ip address of the vulnerable machine.
Last Update: Read in about 8 min