🖥️CTF - Technical Evaluation
This was a technical evaluation I completed as part of the recruitment process for Werfen. The challenge involved compromising the virtual machine and locating all four embedded flags.
I'm not certain whether I’m allowed to share the virtual machine (which I still have stored), but the process followed was based on the instructions provided below:
In this evaluation, you are given access to a virtual machine (VM) simulating an internal server exposed to several publicly known critical vulnerabilities. Your task is to identify and exploit these vulnerabilities to complete the challenge. The system contains a total of four flags, and your minimum objective is to find at least two of them. The flag format is werfen{}.
Last updated