Skip to content
Switch branches/tags
Go to file

Latest commit


Git stats


Failed to load latest commit information.
Latest commit message
Commit time


This is a Wargame VM designed for teaching and challenging people in the basics of Exploitation Development and Reverse Engineering.


I created this to help our growing community of Cyber Security veterans of VetSec learn about Exploitation Development and Reverse Engineering. I intend on having this be open to the public for use by anyone (assuming credit is given if used for purposes other than self learning). It is a work in progress, so please feel free to provide any feedback.


  • Set up initial VM with preinstalled tools with tutorial
  • Create initial challenges with tutorials
  • Work on intermediate challenges without tutorials
  • Create intro to linux?

How to use?

Prerequisite software/knowledge

  1. Vagrant
  • You will need to install the correct version for your Host OS. This is a VM manager that makes it easy to spin up VM's.
  1. VirtualBox Best if installed directly from virtualbox website, not linux repo
  • You will need to install the correct version for your Host OS since the Wargame VM base is VirtualBox.
  1. Basic Command Line knowledge (Both your Host OS and Linux)
  • In Linux, you will need to be able to list files/directories, change directories, execute/run a script/tool
  • In your Host OS, you will only need to know how to run vagrant up and vagrant ssh from the Wargame root folder.

If any of this seems challenging to you and you might need a little help, I recommend using a little google for now, until my tutorial is complete.



Create the Wargame!

Create the Wargame from scratch

Download the Wargame from Github via git clone or the zip file. In a terminal/command prompt, navigate to the root folder of the Wargame and run vagrant up and then vagrant ssh when it is done provisioning to log in.

Run the pre-configured Wargame

If you would like to save a little time, I provided the Wargame in a portable .box file on my Google Drive.
Simply place the file into a folder and just run vagrant add vetsec-wg followed by vagrant up Then from a terminal/command prompt while inside the directory of the box, run vagrant ssh to ssh into the box and head to the challenges located in the home directory!

Play the challenges

The challenges are located in the home directory in the folder called 'challenges'. Please read the README for each challenge. For now, there is no tutorial, but it is in the works!

Other useful information

Logging out and tearing down

To log out, just type logout while in the VM. Once outside of the VM, while still in the terminal/command prompt, run vagrant halt to shut down the VM or vagrant destroy to remove it entirely.

default username: vagrant
default password: vagrant

Please see my blog post about the creation of this VM for other information about the VM and how I created it. There will be more blog posts to follow as I go along!

Common issues and fixes

There is already a VM with this name created

If you ran vagrant up and tried to run this installation again in another folder on the same computer without running vagrant destroy, the old vm is lingering with the same name. To remove it, open virtual box and delete the old box, then you should be able to vagrant up in the new location.

VBoxManage Issues

This is likely because you tried to install virtualbox from the apt repositories, which can cause issues. Please follow the instructions located here for your particular OS.


If you would like to help contribute, please feel free to shoot me a message on any of my methods of communication and we can discuss things in need.

Thank you!

I hope you find this to be useful in your endevours. I'm happy to help in any way I can if you reach out to me. Also, please provide credit to me if you intend to use this for any purpose besides your own self teaching.


No description, website, or topics provided.



No releases published


No packages published