{"description":"Taken from https://www.vulnhub.com/entry/muzzybox-1,434/ \r\n\r\nAbout Release:\r\n Name: MuzzyBox: 1\r\n Date release: 28 Feb 2020\r\n Author: Muzzy\r\n Series: MuzzyBox\r\n Web page: https://github.com/mymuzzy/muzzybox/blob/master/README.md\r\n\r\nDescription:\r\n I have created this amazing CTF for pentester. However, This is not like other CTF which has been using common exploits and tools. Instead, you will learn about Real-world website testing methodology, advance injections and more.\r\n Works better with VirtualBox, rather than VMware. \r\n\r\nVagrant box made by RedHatAugust","short_description":"Taken from https://www.vulnhub.com/entry/muzzybox-1,434/ \r\n\r\nAbout Release:\r\n Name: MuzzyBox: 1\r\n Date release: 28 Feb 2020\r\n Author: Muzzy\r\n Series: MuzzyBox\r\n Web page: https://github.com/mymuzzy/muzzybox/blob/master/README.md\r\n\r\nDescription:\r\n I have created this amazing CTF for pentester. However, This is not like other CTF which has been using common exploits and tools. Instead, you will learn about Real-world website testing methodology, advance injections and more.\r\n Works better with VirtualBox, rather than VMware. \r\n\r\nVagrant box made by RedHatAugust","name":"RedHatAugust/MuzzyBox-1","versions":[{"version":"0.01","status":"active","description_html":"
Base Box: "MuzzyBox: 1"\nInternal Network: "haymarketers"
\n","description_markdown":"Base Box: \"MuzzyBox: 1\"\r\nInternal Network: \"haymarketers\"","providers":[{"name":"virtualbox","checksum":"cd894b675d8059b0153a07c6b343f7428c954f626fca09c9c5fe36c6b9b90ca29d09eabe90f1c88013c79b97fa814363ca959bc25561a174d58aa6bae82c938c","checksum_type":"sha512","url":"https://vagrantcloud.com/RedHatAugust/boxes/MuzzyBox-1/versions/0.01/providers/virtualbox/unknown/vagrant.box"}]}]}