CTF – INIT

Here is the complete package translated into English, ready to be used on your website.

I have separated it into two parts:

  1. The Narrative & Concepts: To be placed as the introduction text.
  2. The Code: The HTML/JS block with the questions and feedback messages translated.

🕵️‍♂️ Mission: Operation INIT

Agent, welcome to HTD Academy.

Our intelligence team has intercepted access credentials for a remote server used by an unknown group. We suspect this machine, codenamed “INIT”, is running a Parrot OS distribution modified to hide sensitive information.

Your mission, should you choose to accept it, is to establish a secure SSH connection, infiltrate the system, and perform a full reconnaissance scan. We need you to extract crucial details about the infrastructure, the user environment, and the network architecture.

Warning: Not everything is as it seems. The system might be masking its real Kernel version to confuse intruders. Trust only the data you extract yourself.

Good luck, Initiate.


📂 Access Data (Briefing)

  • Target: Local Server (Docker Container)
  • Protocol: SSH
  • Port: 22
  • User: dome-scout
  • Password: Oper@tion_Sh3ll!

🧠 Key Concepts (Learning Outcomes)

By completing this “Capture The Flag” (CTF) challenge, you will practice essential Linux administration and auditing fundamentals:

  1. Secure Remote Access: Using the SSH protocol on non-standard ports.
  2. System Enumeration: Identifying processor architecture and Kernel versions (crucial for vulnerability scanning).
  3. Environment Variables: Understanding how Linux stores user configurations, such as the default shell ($SHELL) and home directories ($HOME).
  4. Linux File Hierarchy: Navigating critical directories like /var/mail and /home.
  5. Network Analysis: Identifying network interfaces and reading technical configurations like MTU (Maximum Transmission Unit).

If you don’t now how to install or use Docker, read the link bellow

The Definitive Guide to Docker: Architecture, Installation, and Management


Download the machine from Github and start it

git clone https://github.com/suricatoti/init.git

cd init

docker build -t htd/init:v1 .

docker run -d -p 2223:22 --name htd-init-lab --mount type=volume,source=htd_ssh_keys,target=/etc/ssh/ localhost/htd/init:v1

ssh dome-scout@localhost -p 2223

If you want to learn the content of this CTF:

Linux Fundamentals: Part 2 – The Shell


🖥️ HTD Lab: INIT

Connect via SSH and answer the questions below.

Username: dome-scout / Password: Oper@tion_Sh3ll!.