Step 2:
Continuati lab4 si gasiti ctf2
Download this VirtualBox appliance.
Import the appliance in the VirtualBox. Use "attacker/attacker" credentials to log in. Check for its assigned IPs.
Access from a host Internet browser the "/injection.php" on the Web site of the installed machine. That is the starting point of capturing the first flag. Here are some hints:- Take a look at the "injection.php" file's contents.
- The flag lays in a "ctf1.txt" file, whose contents could only be displayed from the Web page.
When displaying the first flag, you will find out details about the second flag.