
VlunHub Projects



SkyTower Walkthrough
Lab network + IPs we used
Target (SkyTower): 10.0.0.108
Squid proxy (on SkyTower): 10.0.0.108:3128
Target loopback we pivoted to: 127.0.0.1 (used for SSH and MySQL from the proxy’s POV)
Attacker box: Kali (your machine)

Vulnerable-Docker-VM
Lab context
Attacker: Kali 10.0.0.168
Target (vulndocker): 10.0.0.148
Goal: Get WordPress admin (Flag 1) and read host flag (Flag 3) via exposed Docker Remote API.