Analougepond
Beschreibung
I’ve tried to mix things up a little on this one, and have used the feedback from #vulnhub to make this VM a little more challenging (I hope).
Since you’re not a Teuchter, I’ll offer some hints to you:
Remember TCP is not the only protocol on the Internet My challenges are never finished with root. I make you work for the flags. The intended route is NOT to use forensics or 0-days, I will not complain either way.
To consider this VM complete, you need to have obtained:
– Troll Flag: where you normally look for them
– Flag 1: You have it when you book Jennifer tickets to Paris on Pan Am.
– Flag 2: It will include a final challenge to confirm you hit the jackpot.
– Have root everywhere (this will make sense once you’re in the VM)
– User passwords
– 2 VNC passwords
Best of luck! If you get stuck, eat some EXTRABACON
NB: Please allow 5-10 minutes or so from powering on the VM for background tasks to run before proceeding to attack.
Zeit der Kompromittierung
4 Stunden
Betriebssystem
linux
diese virtuelle Umgebung startenErgebnisse des CTF alltheday für Analougepond
Nickname | Virtual Machine | Anzahl der Angreifer | Begonnen am | Maschine kompromittiert in |
- | Analougepond | 0 | 17. Januar 2019 zu 13:47 | - |
- | Analougepond | 2 | 16. November 2018 zu 13:42 | - |
S0uND | Analougepond | 1 | 29. Oktober 2018 zu 19:06 | 0h30 |
B34rD0g | Analougepond | 1 | 11. Oktober 2018 zu 08:10 | 0h29 |
Alex830* | Analougepond | 1 | 7. Oktober 2018 zu 21:18 | 0h46 |