VulnUni: 1.0.1


  • Name: VulnUni: 1.0.1
  • Date release: 20 Mar 2020



Please remember that VulnHub is a free community resource so we are unable to check the machines that are provided to us. Before you download, please read our FAQs sections dealing with the dangers of running unknown VMs and our suggestions for "protecting yourself and your network. If you understand the risks, please download!


vulnuni1.0.1.ova

(Size: 1.4 GB)


 __      __    _         _    _       _ 
 \ \    / /   | |       | |  | |     (_)
  \ \  / /   _| |_ __   | |  | |_ __  _ 
   \ \/ / | | | | '_ \  | |  | | '_ \| |
    \  /| |_| | | | | | | |__| | | | | |
     \/  \__,_|_|_| |_|  \____/|_| |_|_|

Welcome to "Vuln Uni"!

This boot2root machine is realistic without any CTF elements and pretty straight forward.

Goal: Hack your University and get root access to the server.

To successfully complete the challenge you need to get user and root flags.

Difficulty: Easy / Beginner Level

https://emaragkos.gr/vulnhub-writeups/vulnhub-boot2root-machine-vulnuni/

Need hints? Twitter @emaragkos

DHCP is enabled

Your feedback is really valuable for me!

Was there something that you didn’t like about this VM?

Please let me know so that I can make more interesting challenges in the future.

Good luck and have fun :)


## Changelog v1.0.1 - 2020-03-20 v1.0 - 2020/03-19


  • Filename: vulnuni1.0.1.ova
  • File size: 1.4 GB
  • MD5: 07FC142E745CF08F9D9AE842A6D49C5D
  • SHA1: FF3E25A9AB1CCEF5D2CAE1984BF2CD47F1ECC25F


  • Format: Virtual Machine (Virtualbox - OVA)
  • Operating System: Linux


  • DHCP service: Enabled
  • IP address: Automatically assign