InfoSecWarrior CTF 2020: 03


  • Name: InfoSecWarrior CTF 2020: 03
  • Date release: 25 Mar 2020



Please remember that VulnHub is a free community resource so we are unable to check the machines that are provided to us. Before you download, please read our FAQs sections dealing with the dangers of running unknown VMs and our suggestions for "protecting yourself and your network. If you understand the risks, please download!


InfosecWarrior03(CK05).zip

(Size: 1.4 GB)


This VM is given as challenge 3 in InfoSecWarrior CTF 2020.

Official website : https://www.infosecwarrior.com/

This box is dedicated to my mentors (you will find there names in the box itself)

If you face any error or needed help ping me on Twitter CyberKnight00

Or ping them after finding their names.

During the CTF event, this box contains a Loot box (zip file) consist of download link of the next Challenge and super_flag.txt.

Goal : You have to gain highest privileges and collect only 2 flags (user flag and root flag). loot box is not available in this VM.

The WordPress developer configured the machine to work internally. But due to some miss-configuration wordpress is exposed to outside world. Use your skills and get the root flag.

BTW someone already hacked the box and placed his backdoor find it. It will help you.


This works better with VirtualBox than VMware. WordPress is MEANT to be on 127.0.0.1. Can you find away to view it?


  • Filename: InfosecWarrior03(CK05).zip
  • File size: 1.4 GB
  • MD5: 3EE2CCFBEB5E3B6B6E593363A2DA4B05
  • SHA1: 5623686B8E28C7CC659A8C1F74EF8718E6490B4B


  • Format: Virtual Machine (Virtualbox - OVA)
  • Operating System: Linux


  • DHCP service: Enabled
  • IP address: Automatically assign