SBN

Bulldog: 2 CTF Walkthrough

In this article we will solve a capture-the-flag (CTF) challenge named “Bulldog 2.” This CTF was posted on VulnHub by the author Nick Frichette.

As per the description given by the author, this is an intermediate-level machine and the goal of this challenge is to read the flag in the root directory. This is the second edition of this machine; its first part was released last year, and it was an interesting challenge to take. You can see the solution for the “Bulldog 1” here.

For those who are new to my articles, Vulnhub.com is a platform which provides vulnerable machines to gain practical hands-on experience in the field of information security. There are a lot of other challenging CTF exercises available on VulnHub and I highly suggest attempting them, as it is a good way to keep your skills sharp and learn new techniques in a safe environment. You can go through my previous articles to find solutions to these machines and learn new techniques.

Let’s start to set up this machine for solving the challenge. Download the VM to run in a virtual box.

The torrent download URL is also available for this VM, which you can find in the reference section of this article.

Please Note: For all of these machines, I have used Oracle Virtual Box to run the downloaded machine. I will be using Kali Linux as an attacker machine for solving this CTF. The techniques used are solely for educational purposes, and I am not responsible if the listed techniques are used against any other targets.

The Walkthrough

In this machine, there is no need to run the Netdiscover command to get the target IP address. When we run the downloaded machine in the virtual box, the IP address is automatically assigned (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Nikhil Kumar. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/zxECw_Z9gxM/