Creating Boxes for Vulnhub

Introduction

Pseudocode

Target Audience

Intended Foothold

Intended Privilege Escalation

Rabbit Holes

Building the Box

Hardware Requirements

Selecting OS

Networking

Creating Intended Foothold & Privilege Escalation

Outro