This post covers the third and last part of the walkthrough of the Game of Thrones CTF 1 provided by Vulnhub. You can find the first and second part here and here. In the first two parts I have already found 5 kingdom flags and 1 secret flag.
This post covers the second part of the Game of Thrones CTF 1 walkthrough. In the first part I have already found the first two kingdom flags and one secret flag:
This post covers the first part of the Game of Thrones CTF 1 provided by Vulnhub. The CTF contains 11 flags in total (7 kingdom flags, 3 secret flags and one battle flag). The flags will be a md5 hash.
Please notice that this walkthrough might contain SPOILER to the actual series and as usual, if you have not solved this challenge yet, then try it first on your own!
I finally managed to solve the last part of this CTF challenge. If you have not read the first two parts, you can find them here (Part1, Part2). So let me now continue with the last part. As always, ***SPOILER ALERT***
We left the second part with root privileges on the puppet machine and the first flag in folder
Welcome to the second part of the Vulnhub Analoguepond 1 walkthrough. If you have missed the first part, you can find it here.
I have finished the last part with finding the troll flag and escalating the privileges on the first machine. So let’s continue finding the other flags… I had some time to find out how to proceed. I examined a lot, especially at the places where we need root privileges, but I found nothing. After a bit, I looked at the network interfaces and found something interesting
In this post I want to start with a walkthrough of the Vulnhub challenge Analoguepond 1. Since I have not finished this box yet, I will split this walkthrough into several parts. This here is the first part. So lets start.
The first thing I usually do when I start such a challenge is to scan the network in order to find out on which IP address I can find the box. In order to do so I usually use