CLASSIFIED | ADVANCED CTF CHALLENGE
Agent,
The Phantom Collective - a notorious cyber-crime syndicate - has compromised multiple corporate Linux servers. They're planning a massive data heist worth millions.
Your mission: Simulate their attack methodology on YOUR system to understand their tactics, then secure everything they would have exploited.
You will:
⏰ TIME LIMIT: 60 MINUTES
Each challenge has its own countdown. Fail to complete in time, and it LOCKS PERMANENTLY with 0 points.
MISSION START:
Before any attack, hackers perform reconnaissance. You need to understand YOUR system - who you are, what privileges you have, and how the system tracks users.
Run these commands on your Linux terminal and observe the outputs:
Check each box after successfully completing the task:
INFILTRATION PHASE:
Hackers create backdoor accounts to maintain access. You'll simulate this by creating THREE infiltrator accounts on YOUR system. Don't worry - you'll delete them later!
Execute these commands exactly as shown:
sudo = Run with admin privilegesuseradd = Create new user-m = Make home directory-s /bin/bash = Give bash shellpasswd = Set password
TACTICAL ORGANIZATION:
Hackers organize compromised accounts into groups for coordinated attacks. Create a "hackers" group, add all infiltrators, and set up their command center with proper permissions.
-a = Append (keeps existing groups)-G = Group to add to-a, you'll remove users from ALL their other groups!
SECURITY LOCKDOWN:
Now you switch sides! Create test files with different security levels and apply proper permissions to prevent theft. Master the permission system!
FINAL PHASE:
Create a forensic report, then remove ALL infiltrator accounts. Leave no trace!
2>/dev/null hides "mail spool not found" warnings - these are normal and harmless!
MISSION DEBRIEFING
Outstanding work, Agent! You've successfully completed the Permission Heist challenge.
Skills Mastered: