Drunk Admin Web Hacking Challenge: 1

  • Name: Drunk Admin Web Hacking Challenge: 1
  • Date release: 2 Apr 2012


(Size: 539 MB)


The network is configured to obtain an IP address via DHCP by default. Although if you want to further configure the virtual machine you can login as user root and password toor. The apache web server is configured to run on port 8880.


The challenge includes an image hosting web service that has various design vulnerabilities. You must enumerate the various web service features and find an exploitable vulnerability in order to read system hidden files. The web application is 100% custom so do not try to search google for relative PoC exploit code.

FINAL GOAL: Reveal the hidden message for a date arrange that Bob sent to Alice.

Source: https://bechtsoudis.com/work-stuff/challenges/drunk-admin-web-hacking-challenge/

  • Filename: drunk_admin_hacking_challenge.zip
  • File size: 539 MB
  • MD5: EDF9BCD28049ED85312510D5872EA463
  • SHA1: 78AE803F76417D0531CAAE9210DB98426440EB15

  • Format: Virtual Machine (VMware)
  • Operating System: Linux

  • DHCP service: Enabled
  • IP address: Automatically assign

  • Remote Vulnerability
  • Web Application

  • Unrestricted Upload of File with Dangerous Type