In my last article, we exploited a vulnerable machine from the vulnhub.com. That article must have given you some idea about hacking a machine without