Home

NEWS: The release candidate rc1 is now under test! DVL v1.0 is estimated mid December 2006 Meanwhile you can download the DVL brochure here.

 
spacer.png, 0 kB

Estimated DECEMBER 2006!

NEWS: The release candidate rc1 has been arrived and is now under testing progress! Meanwhile you can download the DVL brochure here. The release is esimated latest mid of December! 

Damn Vulnerable Linux (DVL) is full of vulnerable and exploitable software. NEVER use this system in any production environment!

Image
What is Damn Vulnerable Linux?
Damn Vulnerable Linux (DVL) is a Linux-based (modified Damn Small Linux) tool for IT-Security & IT-Anti-Security and Attack & Defense. It was initiated for training tasks during university lessons by the IITAC (International Institute for Training, Assessment, and Certification) and S²e ...
read more>>
 
Image
First steps with Damn Vulnerable Linux
You can view the introductionary training video here! (72 MB size) Download the distribution and run it in a virtual machine. Do not install this at your harddisk. Start the virtual machine. You will find the training levels at: /home/dvl/ The directory structure is ordered by application secu ...
read more>>
 
Image
Your First Damn Vulnerable Linux Lesson

read more>>
Image
BinExploitMe Lessons
In computer security and programming, a buffer overflow, or buffer overrun, is a programming error which may result in a memory access exception and program termination, or in the event of the user being malicious, a breach of system security.A buffer overflow is an anomalous condition where a proce ...
read more>>
 
Image
WebExploitMe Lessons
In common usage, to deface something refers to the act of marking or removing the part of an object (especially images, be they on the page, in illustrative art or as sculpture) designed to hold the viewers attention. Example acts of defacement could include scoring a book cover with a blade, splash ...
read more>>
 
Image
CrackMe Lessons
A CrackMe is a small program designed to test a programmers reverse engineering skills. Crackmes, Reversemes and Keygenmes have similar protection schemes and algorithms to those found in commercial protections. The Crackmes.de team welcomes you to the world first and largest community webs ...
read more>>