The story
The internet bill went unpaid. The router blinks offline. Somewhere on the box there's a captured handshake and a wordlist someone downloaded before the line died.
Week 1 was about Linux command-line fundamentals. Not CTF tricks, not tool mastery — just find, cat, and grep. The three commands every security analyst uses before they open anything else.
The challenge had two stages, twenty minutes on the clock, and a shared account that reset every ten minutes so no one could mess with state for the next player.
Connecting
ssh player2018@192.3.0.150
# password: linux101
The environment was a minimal Linux box. No internet. No fancy tools. Just the filesystem.
Stage 1 — Find the handshake
The scenario: there's a captured WiFi handshake file somewhere on the box. find is the right tool.
find / -name "*.cap" 2>/dev/null
find / -name "*.pcap" 2>/dev/null
find / -name "*handshake*" 2>/dev/null
Most players found it by searching for .cap extensions — the standard format for captured WiFi handshakes (tools like airodump-ng output these).
The file was sitting in a non-obvious path inside /home — not in player2018's home, but in another user's directory that happened to be world-readable.
Stage 2 — Find the wordlist
Same idea, different extension. A wordlist is just a text file full of passwords:
find / -name "*.txt" -size +10k 2>/dev/null
find / -name "*wordlist*" 2>/dev/null
find / -name "*rockyou*" 2>/dev/null
Once found, cat confirms it's actually a password list. grep can search it:
grep "password" /path/to/wordlist.txt | head -20
The flag
The flag was embedded inside the handshake file's metadata comment field — visible with cat or strings:
cat /path/to/handshake.cap | grep "flag{"
flag{gr3p_find_c4t_basics}
What it tested
- Navigating a filesystem you've never seen
- Using
findwith-name,-size, and stderr suppression (2>/dev/null) catto inspect files,grepto search inside them- Not panicking when the clock is running
38 out of 62 students solved it. The 24 who didn't mostly got lost at the find stage — searching only in /home rather than the whole filesystem, or not suppressing permission errors.
Week 2
Next Saturday: Recon & Scanning. Nmap, WhatWeb, Shodan, OSINT investigation challenge. The complexity level goes up significantly — you'll be mapping a real (fictional) target network under time pressure.
Start reading man nmap now.
Challenge designed and deployed by Daniel Junior, UniCyber Technical Lead.