SecTalks: BNE0x00 - Minotaur

  • Name: SecTalks: BNE0x00 - Minotaur
  • Date release: 9 Oct 2015


(Size: 676 MB)

Minotaur CTF

Minotaur is a boot2root CTF. Once you load the VM, treat it as a machine you can see on the network, i.e. you don't have physical access to this machine. Therefore, tricks like editing the VM's BIOS or Grub configuration are not allowed. Only remote attacks are permitted. There are a few flag.txt files around to grab. /root/flag.txt is your ultimate goal.

I suggest you use VirtualBox with a Host Only adapter to run Minotaur fairly painlessly.

The VM will assign itself a specific IP address (in the range). Do not change this, as the CTF will not work properly without an IP address of 192.168.56.X.

If you load the .ova file in VirtualBox, you can see this machine from another VirtualBox machine with a "Host Only" network adapter. You can see the machine from VMWare Workstation by: - Going into Virtual Network Editor and changing the VMnet0 network to "Bridged to: VirtualBox Host-Only Ethernet Adapter". - Setting your VMWare network adapter to Custom (VMnet0) - If necessary, resetting your network adapter (e.g. ifdown eth0 && ifup eth0) so that you get a address.


The VM is located here: [File size: 691MB]


  1. This CTF has a couple of fairly heavy password cracking challenges, and some red herrings.
  2. One password you will need is not on rockyou.txt or any other wordlist you may have out there. So you need to think of a way to generate it yourself.

Contact @RobertWinkel for more hints.

  • Filename: minotaur_CTF_BNE0x00.ova
  • File size: 676 MB
  • MD5: 5CB751E8A017EB13702377E86D07CA86
  • SHA1: E2656937662CBB8DE23E92E0D3346A8A0A19C2C2

  • Format: Virtual Machine (Virtualbox - OVA)
  • Operating System: Linux

  • DHCP service: Disabled
  • IP address: