Mission Brief (Read Carefully)
Your goal is to harvest flags hidden across files, dotfiles, ciphers & simulated network telemetry. Flags look like flag{SOMETHING_HARD_TO_GUESS}.
Hunt rules (professionals’ edition):
- Recon before exploitation. Map the FS, enumerate hidden entries, fingerprint services.
- Expect multi step pivots: cipher → hint → service → artifact → flag.
- Assume misdirection. Not every “secret” is a flag; validate artifacts.
Checklist: use objectives to see codename targets & progress. Reveal hints surgically via clue <CODE> <1|2|3>. Record finds automatically, or type submit flag{...}.
Suggested first moves: map, then ls -al in interesting nodes, then fingerprint with nmap -sV & ping on suspect hosts.
Quick Reference
- FS:
ls [-al] [path],cd,pwd,mkdir,touch,rm [-r],cat,echo "..." > file - Crypto:
decrypt(base64),rot13,caesar <file> <shift>,vigenere <file> <key>,morse - Net:
ping,netstat [-a],ss,traceroute,nmap [-sV],iptables -L - CTF:
map,scan,inventory,unlock <password>,solve <id> <answer> - Meta:
objectives,clue,flags,submit flag{...},history,theme,save/load/reset
Terminal