Ike is a servant of something which also starts with "I" and has only three letters.

Flags - /root/flag.txt - /home/ike/flag.txt

Tested with VirtualBox

DHCP enabled

Difficulty: Intermediate

Should not be as easy as to just run a MSF module to get root right away, if so please let me know.

Eric is trying to reach out on the Internet, but is he following best practice?

Flags - /root/flag.txt - /home/eric/flag.txt

Tested with VirtualBox

DHCP enabled

Difficulty: Beginner

Should not be as easy as to just run a MSF module to get root right away, if so please let me know.

Christophe is creating a web page for his resistance. Will he succeed?

Flags - /root/flag.txt - /home/christophe/flag.txt

Tested with VirtualBox

DHCP enabled

Difficulty: Intermediate

Should not be as easy as to just run a MSF module to get root right away, if so please let me know.

N/A

Gittysburg is an intermediate level boot2root vulnerable VM. There are four flags to capture. Will you be able to git root?

W34kn3ss: 1

askar 14 Aug 2018

The matrix is controlling this machine, neo is trying to escape from it and take back the control on it , your goal is to help neo to gain access as a “root” to this machine , through this machine you will need to perform a hard enumration on the target and understand what is the main idea of it , and exploit every possible “weakness” that you can found , also you will be facing some upnormal behaviours during exploiting this machine.

This machine was made for Jordan’s Top hacker 2018 CTF , we tried to make it simulate a real world attacks “as much as possible” in order to improve your penetration testing skills , also we but a little tricky techniques on it so you can learn more about some unique skills.

The machine was tested on vmware (player / workstation) and works without any problems , so we recommend to use VMware to run it , Also works fine using virtualbox.

Difficulty: Intermediate , you need to think out of the box and collect all the puzzle pieces in order to get the job done.

The machine is already got DHCP enabled , so you will not have any problems with networking.

Happy Hacking !

Raven 2 is an intermediate level boot2root VM. There are four flags to capture. After multiple breaches, Raven Security has taken extra steps to harden their web server to prevent hackers from getting in. Can you still breach Raven?

Typhoon Vulnerable VM

Typhoon VM contains several vulnerabilities and configuration errors. Typhoon can be used to test vulnerabilities in network services, configuration errors, vulnerable web applications, password cracking attacks, privilege escalation attacks, post exploitation steps, information gathering and DNS attacks. Prisma trainings involve practical use of Typhoon.

MD5 (Typhoon-v1.02.ova) = 16e8fef8230343711f1a351a2b4fb695

OS: Linux

Author: PrismaCSI

Series: Typhoon

Format: VM(OVA)

DHCP service: Enabled

IP address: Automatically assign

Task is to become root and read /root/flag.txt.

Pinky has setup a development environment to develop and test new software. He thinks his dev environment is pretty locked down security wise, what do you think?

Network (DHCP) Bridged

Difficulty for user: Hard/Expert

Difficulty for root: Hard/Expert

Tested in VirtualBox