Skip to content

Instantly share code, notes, and snippets.

@captn3m0
Last active March 26, 2017 15:43
Show Gist options
  • Save captn3m0/6feae9ab5b025387ded1 to your computer and use it in GitHub Desktop.
Save captn3m0/6feae9ab5b025387ded1 to your computer and use it in GitHub Desktop.
CCTC-Wave-I-VM-Challenge

I found the original CCTC Preliminary challenge disk in lab a few days back, and wanted to post it here in case someone wants to test their penetration testing/hacking skills. Harshil & Me had worked on it for the first round of the first iteration of CCTC (which we later won).

#Instructions

  1. Get the VMWare image from http://clipx.cloudapp.net/cctc/
  2. Hack.
  3. Credentials are student:student (username:password)
  4. Open <VM_IP>/cctc in your browser.

#Rules

  1. Only application and its serving components can be tested for vulnerabilities. The serving components include
  • Webserver
  • Operating System
  • Any other services/files in the guest machine and guest operating system
  1. Any vulnerability identified in any component outside the above mentioned ones, will not be used for evaluation
  2. All participants should necessarily submit all the exploit codes/custom scripts written to identify the vulnerabilities in the system.
  3. The deadline for the original challenge was 2 weeks, but you're free to take as much time as you want. If anyone's really interested, you can make a list of vulnerabilities you've found and email me. The person with highest score gets a chapo from me.

#Download VM Image

#Alternative Link

I'll post my own writeup and scripts after a while.

@jaybosamiya
Copy link

I guess it should be <VM_IP>/cctc, right?

@jaybosamiya
Copy link

PS: 404 error on the links right now

@captn3m0
Copy link
Author

@jaybosamiya: I know this is late, but this is now fixed. (GitHub doesn't send me notifications)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment