Raven 2

Date

Validations

10 Compromissions 13%

Note  Notation

0 Vote

Description

Raven 2 is an intermediate level boot2root VM. There are four flags to capture. After multiple breaches, Raven Security has taken extra steps to harden their web server to prevent hackers from getting in. Can you still breach Raven?

Compromission time

4 hours

Operating system

 linux

start this virtual environnement

CTF Results CTF Results for Raven 2

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Raven 2 0 1 December 2018 at 08:45 -