Replay is a sequel to Bob my first CTF. What sort of terrible redneck netsec engineering has Bob done now?

Your Goal is to get root and read /flag.txt

Note: There are three difficulties Hard: No Changelog.txt, no hex editor Mid: Read Changelog.txt, no hex editor Easy: Anything goes

Leopold is a poor adventurous little Internet user trying to find amusement.

Flags - /root/flag.txt - /home/leopold/flag.txt

Tested with VirtualBox

DHCP enabled

Difficulty: Beginner/Intermediate

Should not be as easy as to just run a MSF module to get root right away, if so please let me know.

Jenkins will hack you into pieces! Watch out. He usually works alone, but sometimes he tries to work with his imaginary friends.

Flags - /root/flag.txt - /home/jenkins/flag.txt

Tested with VirtualBox

DHCP enabled

Difficulty: Intermediate

Should not be as easy as to just run a MSF module to get root right away, if so please let me know.

Ike is a servant of something which also starts with "I" and has only three letters.

Flags - /root/flag.txt - /home/ike/flag.txt

Tested with VirtualBox

DHCP enabled

Difficulty: Intermediate

Should not be as easy as to just run a MSF module to get root right away, if so please let me know.

Eric is trying to reach out on the Internet, but is he following best practice?

Flags - /root/flag.txt - /home/eric/flag.txt

Tested with VirtualBox

DHCP enabled

Difficulty: Beginner

Should not be as easy as to just run a MSF module to get root right away, if so please let me know.

Christophe is creating a web page for his resistance. Will he succeed?

Flags - /root/flag.txt - /home/christophe/flag.txt

Tested with VirtualBox

DHCP enabled

Difficulty: Intermediate

Should not be as easy as to just run a MSF module to get root right away, if so please let me know.

N/A

Gittysburg is an intermediate level boot2root vulnerable VM. There are four flags to capture. Will you be able to git root?

W34kn3ss: 1

askar 14 Aug 2018

The matrix is controlling this machine, neo is trying to escape from it and take back the control on it , your goal is to help neo to gain access as a “root” to this machine , through this machine you will need to perform a hard enumration on the target and understand what is the main idea of it , and exploit every possible “weakness” that you can found , also you will be facing some upnormal behaviours during exploiting this machine.

This machine was made for Jordan’s Top hacker 2018 CTF , we tried to make it simulate a real world attacks “as much as possible” in order to improve your penetration testing skills , also we but a little tricky techniques on it so you can learn more about some unique skills.

The machine was tested on vmware (player / workstation) and works without any problems , so we recommend to use VMware to run it , Also works fine using virtualbox.

Difficulty: Intermediate , you need to think out of the box and collect all the puzzle pieces in order to get the job done.

The machine is already got DHCP enabled , so you will not have any problems with networking.

Happy Hacking !

Raven 2 is an intermediate level boot2root VM. There are four flags to capture. After multiple breaches, Raven Security has taken extra steps to harden their web server to prevent hackers from getting in. Can you still breach Raven?