Rakhat - a set of deliberately exploitable VM’s designed to provide practice for web exploits for penetration testing.
Rakhat - a set of deliberately exploitable VM’s designed to provide practice for penetration testing. This set includes 2 machines, named Blake-Sploitable and Corey, that each include a variety of exploits and attack vectors.
Blake-Sploitable is much more susceptible to exploitation than Corey, and is designed to provide practice for low-level attacks and exploits. Corey is only accessible from Blake-Sploitable or a remote login, and has much more stringent security measures. This machine is designed for low to moderate level exploits.
We suggest these machines are used in tandem on a local, host-only network for the best experience. It’s important to note that these machines are designed for practice only, and are not designed for business or personal use, and should not be allowed to access an external network.
Please note these machines were designed on VMWare and may not function properly on VirtualBox
Linux Users:
Mac OS Users:
Windows Users:
Repeat these instructions with both machines.
Add the IP’s that you discover in your recon to the /etc/hosts files on the opposite machines: