CTF Challenges for the Linux User Group covering the following pwn.college modules:
Each challenge folder has a README with setup instructions.
Run any challenge with:
bash
./build.sh challenge-name
docker run -it challenge-name
See [CONTRIBUTING.md] for the full guide on building challenges.
bash
git clone repo-url
cd Linux_CTF_Spring2026
bash
./build.sh base
bash
cp -r challenge_template challenges/topic/challenge-name
challenges/
├── users/
└── who-goes-there/
├── permissions/
└── processes/
flame{...}
Actually understanding the relavence and importance as to why we apply and use the tools and concepts here is more essential than just plug and chugging, read on to understand the background of each notable concept and challenge used for this CTF.
Linux is an essential tool for cybersecurity professionals due to its vast security features, versatility, and open-source nature. It is for these reasons that makes linux a valuable tool for ethical hacking as well as building secure networks and systems.
In a cybersecurity standpoint, learning about users in Linux is essential due to the mass quantity of servers, cloud infrastructure, and security tools Linux powers. This makes user management critical for preventing unauthorized access.
Author: AJ Arguello (@SeveralBandicoot)
Summary:
For this challenge, I used the RockYou company's data breach in 2009 as inspiration. For this challenge, the main idea is using the wordlist RockYou.txt and utilize John the Ripper to run against a file that is accessible only by the admin user in which the user would have to login to first.
What was the RockYou 2009 Data Breach?
This data breach involved the compromise of about 32 million user accounts, this exposed the company's poor practices of security as RockYou stored its passwords in plain text, no hash. On top of this, after the breach the company had tried to downplay the severity of said breach which resulted in the loss of credibility and user trust leading to its downfall in the coming years.
What is RockYou.txt?
This is a single wordlist list consisting of about 14 million out of the 32 million passwords leaked publically and is used as the most popular resource for security testing.
Sources: