The Beast 2 is an intermediate level boot2root VM. Capture the flag event, can you follow the hints?. Can you still breach The Beast?
Name: Basilic Author: DrStache
The Basilic VM was created as part of NorzhCTF 2019.
A Python developer has put a website online. Your goal is to compromise the different users of the server and gain root privileges.
There are 4 flags to retrieve, they are in md5 format.
Difficulty: Intermediate / Hard
Categories: Web, Jail, Crypto, PrivEsc
For any questions, feel free to contact me on Twitter: @DrStache_
This machine hopes to inspire BRAVERY in you; this machine may surprise you from the outside. This is designed for OSCP practice, and the original version of the machine was used for a CTF. It is now revived, and made more nefarious than the original.
This machine reminds us of a DEVELOPMENT environment: misconfigurations rule the roost. This is designed for OSCP practice, and the original version of the machine was used for a CTF. It is now revived, and made slightly more nefarious than the original.
Matrix v2.0 is a medium level boot2root challenge. The OVA has been tested on both VMware and Virtual Box.
Flags: Your Goal is to get root and read /root/flag.txt
Hint: Follow your intuitions ... and enumerate!
Replay is a sequel to Bob my first CTF. What sort of terrible redneck netsec engineering has Bob done now?
Your Goal is to get root and read /flag.txt
Note: There are three difficulties Hard: No Changelog.txt, no hex editor Mid: Read Changelog.txt, no hex editor Easy: Anything goes