LinuxCTF - Linux Challenges
https://tryhackme.com/room/linuxctf
Task 1 Linux Challenges Introduction
How many visible files can you see in garrys home directory?
garry@ip-10-10-255-137:~$ ls
flag1.txt flag24 flag29
garry@ip-10-10-255-137:~$ ls | wc -lTask 2 The Basics
What is flag 1?
garry@ip-10-10-255-137:~$ cat flag1.txt
Log into bob's account using the credentials shown in flag 1.
What is flag 2?


Flag 3 is located where bob's bash history gets stored.

Flag 4 is located where cron jobs are created.

Find and retrieve flag 5.

"Grep" through flag 6 and find the flag. The first 2 characters of the flag is c9.

Look at the systems processes. What is flag 7.

De-compress and get flag 8.
By look in your hosts file, locate and retrieve flag 9.
10 Find all other users on the system. What is flag 10.
Task 3 Linux Functionality
Run the command flag11. Locate where your command alias are stored and get flag 11.
Flag12 is located were MOTD's are usually found on an Ubuntu OS. What is flag12?
Find the difference between two script files to find flag 13.

Where on the file system are logs typically stored? Find flag 14.
Can you find information about the system, such as the kernel version etc.
Find flag 15.

Flag 16 lies within another system mount.
Login to alice's account and get flag 17. Her password is TryHackMe123
Find the hidden flag 18.
Read the 2345th line of the file that contains flag 19.
Task 4 Data Representation, Strings and Permissions
Find and retrieve flag 20.
Inspect the flag21.php file. Find the flag.

Locate and read flag 22. Its represented as hex.
Locate, read and reverse flag 23.
Analyse the flag 24 compiled C program. Find a command that might reveal human readable strings when looking in the source code.
Flag 25 does not exist.
Locate and retrieve flag 26.

Locate and retrieve flag 27, which is owned by the root user.

Whats the linux kernel version?
Find the file called flag 29 and do the following operations on it:
Task 5 SQL, FTP, Groups and RDP
Use curl to find flag 30.
Flag 31 is a MySQL database name.
Bonus flag question, get data out of the table from the database you found above!
Using SCP, FileZilla or another FTP client download flag32.mp3 to reveal flag 32.
Flag 33 is located where your personal $PATH's are stored.
Switch your account back to bob. Using system variables, what is flag34?
Look at all groups created on the system. What is flag 35?
Find the user which is apart of the "hacker" group and read flag 36.
Well done! You've completed the LinuxCTF room!
Last updated