Ctf5 Instructions
User Manual:
Open the PDF directly: View PDF
Page Count: 54
- About the Project
- The username and password for the image can be found in this documentation. However, the point of the exercise is to discover the root username and password, so they are not provided up front. If you must have the credentials to access the virtual image please read the end of the documented compromise steps.
- Getting Started
- Step 1 – Build an MD5 Hash Database
- Step 2 – Reconnaissance
- Step 3 – Vulnerability scan
- Step 4 – Manual Discovery
- Step 5 – Exploiting Vulnerable Software
- Step 6 – Leverage exploits to create a shell account
- Step 7 – Access the Root Account
- Step 8 – Steal the Shadow File and Crack It
- Lessons Learned
- Other Unscripted Attack Vectors: