LinuxCTF - Linux Challenges
https://tryhackme.com/room/linuxctf
Task 1 Linux Challenges Introduction
How many visible files can you see in garrys home directory?
garry@ip-10-10-255-137:~$ ls
flag1.txt flag24 flag29
garry@ip-10-10-255-137:~$ ls | wc -l3
Task 2 The Basics
What is flag 1?
garry@ip-10-10-255-137:~$ cat flag1.txt
f40dc0cff080ad38a6ba9a1c2c038b2c
Log into bob's account using the credentials shown in flag 1.
What is flag 2?


8e255dfa51c9cce67420d2386cede596
Flag 3 is located where bob's bash history gets stored.

9daf3281745c2d75fc6e992ccfdedfcd
Flag 4 is located where cron jobs are created.

dcd5d1dcfac0578c99b7e7a6437827f3
Find and retrieve flag 5.

bd8f33216075e5ba07c9ed41261d1703
"Grep" through flag 6 and find the flag. The first 2 characters of the flag is c9.

c9e142a1e25b24a837b98db589b08be5
Look at the systems processes. What is flag 7.

274adb75b337307bd57807c005ee6358
De-compress and get flag 8.
75f5edb76fe98dd5fc9f577a3f5de9bc
By look in your hosts file, locate and retrieve flag 9.
127.0.0.1 dcf50ad844f9fe06339041ccc0d6e280.com
dcf50ad844f9fe06339041ccc0d6e280
10 Find all other users on the system. What is flag 10.
5e23deecfe3a7292970ee48ff1b6d00c:x:1002:1002:,,,:/home/5e23deecfe3a7292970ee48ff1b6d00c:/bin/bash
5e23deecfe3a7292970ee48ff1b6d00c
Task 3 Linux Functionality
Run the command flag11. Locate where your command alias are stored and get flag 11.
alias flag11='echo "You need to look where the alias are created..."' #b4ba05d85801f62c4c0d05d3a76432e0
b4ba05d85801f62c4c0d05d3a76432e0
Flag12 is located were MOTD's are usually found on an Ubuntu OS. What is flag12?
# Flag12: 01687f0c5e63382f1c9cc783ad44ff7f
01687f0c5e63382f1c9cc783ad44ff7f
Find the difference between two script files to find flag 13.

3383f3771ba86b1ed9ab7fbf8abab531
Where on the file system are logs typically stored? Find flag 14.
71c3a8ad9752666275dadf62a93ef393
Can you find information about the system, such as the kernel version etc.
Find flag 15.

a914945a4b2b5e934ae06ad6f9c6be45
Flag 16 lies within another system mount.
cab4b7cae33c87794d82efa1e7f834e6
Login to alice's account and get flag 17. Her password is TryHackMe123
89d7bce9d0bab49e11e194b54a601362
Find the hidden flag 18.
c6522bb26600d30254549b6574d2cef2
Read the 2345th line of the file that contains flag 19.
490e69bd1bf3fc736cce9ff300653a3b
Task 4 Data Representation, Strings and Permissions
Find and retrieve flag 20.
02b9aab8a29970db08ec77ae425f6e68
Inspect the flag21.php file. Find the flag.

g00djob
Locate and read flag 22. Its represented as hex.
9d1ae8d569c83e03d8a8f61568a0fa7d
Locate, read and reverse flag 23.
ea52970566f4c090a7348b033852bff5
Analyse the flag 24 compiled C program. Find a command that might reveal human readable strings when looking in the source code.
hidd3nStr1ng
Flag 25 does not exist.
No answer needed
Locate and retrieve flag 26.

4bceb76f490b24ed577d704c24d6955d
Locate and retrieve flag 27, which is owned by the root user.

6fc0c805702baebb0ecc01ae9e5a0db5
Whats the linux kernel version?
4.4.0-1075-aws
Find the file called flag 29 and do the following operations on it:
Remove all spaces in file. Remove all new line spaces. Split by comma and get the last element in the split.
fastidiisuscipitmeaei
Task 5 SQL, FTP, Groups and RDP
Use curl to find flag 30.
fe74bb12fe03c5d8dfc245bdd1eae13f
Flag 31 is a MySQL database name.
MySQL username: root
MySQL password: hello
2fb1cab13bf5f4d61de3555430c917f4
Bonus flag question, get data out of the table from the database you found above!
ee5954ee1d4d94d61c2f823d7b9d733c
Using SCP, FileZilla or another FTP client download flag32.mp3 to reveal flag 32.
tryhackme1337
Flag 33 is located where your personal $PATH's are stored.
547b6ceee3c5b997b625de99b044f5cf
Switch your account back to bob. Using system variables, what is flag34?
7a88306309fe05070a7c5bb26a6b2def
Look at all groups created on the system. What is flag 35?
769afb6
Find the user which is apart of the "hacker" group and read flag 36.
83d233f2ffa388e5f0b053848caed1eb
Well done! You've completed the LinuxCTF room!
No answer needed
Last updated
Was this helpful?