Please remember that VulnHub is a free community resource so we are unable to check the machines that are provided to us. Before you download, please read our FAQs sections dealing with the dangers of running unknown VMs and our suggestions for "protecting yourself and your network. If you understand the risks, please download!
.-. %%%%,/ :-. % `%%%, / `\ _, |' )`%%| '-' / Filename: pegasus.ova \_/\ %%%/`-.___.' MD5: 5046e330ff42e9adee0a42b63694cbfe __/ %%%"--"""-.%, SHA1: f18b7437ca3c96f76a2e1b06f569186b63567dd5 /`__| %% \%% Difficulty: Intermediate \\ \ / | /'%, Author: Knaps \] | /----'. < `%, Tester: Mulitia || `>> > || ///` /( //(
Welcome to my first boot2root VM! Inspired by various CTF events I took part in and by couple cool concepts I learnt in the last couple months.
Rules of engagement are simple - find a way in, escalate your privileges all the way up to the root and get the flag!
As with all VMs like this, think outside the box, don't jump to conclusions too early and "read between the lines" :)
The VM has been tested on VMWare and VirtualBox, just import it, ensure the network is set as "Host Only" and run it. It should pick up the IP address automatically.