Beruflich Dokumente
Kultur Dokumente
During the workshop you have to explore the machine and discover useful information, look for valuable
data etc. At the same time you may record them for scoring in the given format. Some examples of useful
information that can be used for scoring are as follows, (BUT NOT limited to only to those)
1. Find IP Address , Machines names, OS type and the version , Services, open ports, MAC Addresses
and Vulnerabilities you found in the host
6. Contents of password files (The full content of the file, not just the hash value)
7. Cracked passwords
8. Contents of useful files (Notes for the admins, design documents, scripts with passwords, etc...)
12. Other services of accessing the target. Ex: FTP, Telnet, SSH etc
1. USE ONLY the IP addresses provided. Using other IP addresses may result in deduction of marks.
3. Information gathered through web sites, FTP Accounts, SSH, Telnet, documents etc. will give you
some hints, so grab them and move forward.
4. Initial attack IP range is 10.0.0.X and you may proceed to identify live hosts, other network
segments etc.
4. There may be Honey Pots in the network BE CAREFUL. This may eat up your competition time also
may lose some points you already obtained
5. No DOS/DDOS
6. No Hardening
You do not need to delete any lines in that file, just add you own line to that file. You should also ensure
that your entire Index number or name is on the same line in the file. Invalid or corrupted hash values will
not be processed for scoring.
3. Host the flag (create txt file with your index number in the root) – 30pts