005
- Description: Hey! I got the /etc/shadow file from the machine, but I don't know how to crack the root password.
Includes write-ups on the topic of Linux
View all tags- Description: Hey! I got the /etc/shadow file from the machine, but I don't know how to crack the root password.
- Description: Flag inside the zip file.
- Description: Find your path, padawan!
- Description: Simple script
- Description: Unzip this archive and find the flag.
- Description: How to automate tasks to run at intervals on linux servers?
- Difficulty: Very easy
- Description: Use srch_strings from the sleuthkit and some terminal-fu to find a flag in this disk image
- Description: All we know is the file with the flag is named down-at-the-bottom.txt...
- Description: Can you find the flag in this disk image?
- Description: Can you find the flag in this disk image? The right one is Linux! One wrong step and its all gone!
- Description: Can you find the flag in this disk image? This time, its not as plain as you think it is!
- Description: Can you abuse the banner?
- Description: First challenge of cracking, writen in C with vi and compiled with GCC32
- Difficulty: Very easy
- Description: This file was found among some files marked confidential but my pdf reader cannot read it, maybe yours can.
- Description: Unzip this archive and find the file named 'uber-secret.txt'
- Description: Can you find the flag in file? This would be really tedious to look through manually, something tells me there is a better way.
- Description: A really easy VM. Thats a gift
- Description: CTF. Have Fun.
- Description: Our server seems to be leaking pieces of a secret flag in its logs. The parts are scattered and sometimes repeated. Can you reconstruct the original flag?
- Description: Do you know how to move between directories and read files in the shell?
- Difficulty: Very easy
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
---
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
🔎 Solution
- Description: Can you read files in the root file?
- Description: A Rick and Morty CTF. Help turn Rick back into a human!
- Description: Sometimes you need to handle process data outside of a file. Can you find a way to keep the output from this program and search for the flag?
- Difficulty: Very easy
- Description: A ctf for beginners, can you root me?
- Difficulty: Very easy
- Description: Download this disk image and find the flag.
- Description: Download the disk image and use mmls on it to find the size of the Linux partition.
- Description: Reception of Special has been cool to say the least.
- Description: Privilege escalation
- Description: Using a Secure Shell (SSH) is going to be pretty important.
- Description
- Description: There's an interesting script in the user's home directory
- Description: People keep trying to trick my players with imitation flags. I want to make sure they get the real thing! I'm going to provide the SHA-256 hash and a decrypt script to help you know that my flags are legitimate.
- Description: Can you invoke help flags for a tool or binary? This program has extraordinarily helpful information...