Avatar

Labs / Compromised 1

  • Medium
  • Released 11 Nov 2024
The lab needs to be started first.
Need help to start?
Medium

Compromised 1: Vulnerability Exploitation Challenge

Your mission: infiltrate the system, exploit its vulnerabilities and escalate privileges to capture hidden flags. This CTF will test your offensive security skills to their limits. The system is waiting. The flags are hidden. Your hunt begins now.

Start the Machine when ready…

Challenge Overview

In "Compromised 1" your objective is to locate two hidden flags:

  1. User Flag: Located in the /home directory.
  2. Root Flag: Located in the /root directory.

Steps to Success

  1. Start the Machine: Launch the provided virtual machine.
  2. Network Scanning: Use tools like Nmap to scan the network, identifying open ports and services.
  3. Exploit Vulnerabilities: Discover and exploit system vulnerabilities to gain initial access.
  4. Privilege Escalation: After gaining initial access, escalate your privileges to access the /root directory and capture the root flag.

Goal

Your mission is to locate both hidden flags. Use your ingenuity and expertise to uncover them. Best of luck, and enjoy the challenge!