Com certeza! Aqui está a tradução completa para o inglês, seguindo o tom profissional e focado em segurança da HTD Academy:
🕵️♂️ Mission: Operation Deep Scan
Mission Scenario
Agent dome-scout, the first phase of the infiltration was successful.
The “The Shell” server has been mapped, but security has been alerted to the initial breach. The system administrator has cleaned the logs and tightened visible security.
Your new mission is to go beyond the obvious. We need you to investigate the depths of the filesystem and the metadata to extract critical information that the administrator didn’t expect you to look for. You must map the user’s activity history file and, crucially, inspect the digital signature (Inode) of the privileges file (sudoers).
Accessing these Inode numbers is the first step in creating an undeniable chain of evidence.
Proceed with caution and depth. The Dome is waiting.
📂 Access Data (Briefing)
- Target:
htd-recon-labServer - Protocol: SSH
- Port:
2223 - User:
dome-scout - Password:
Oper@tion_Sh3ll!
🧠 Learning Objectives (Concepts Covered)
By completing this challenge, you will master essential skills that separate the basic user from the security investigator:
- Hidden File Reconnaissance: Using commands to list and identify hidden configuration and history files (those starting with
.in Linux). - Filesystem Metadata (Inodes): Understanding that every file in Linux has a unique index number (Inode). This is fundamental for digital forensics and linking files to storage.
- User Configuration Files: Understanding the purpose of user files like
.bash_history(the trail of user activity). - Using the
statTool: Utilizing commands that access low-level metadata instead of just the file content.
If you don’t now how to install or use Docker, read the link bellow
The Definitive Guide to Docker: Architecture, Installation, and Management
Download the machine from github and start it
git clone https://github.com/suricatoti/index.git
cd index
docker build -t htd/index:v1 .
docker run -d -p 2223:22 --name htd-index-lab --mount type=volume,source=htd_ssh_keys,target=/etc/ssh/ localhost/htd/index:v1
ssh dome-scout@localhost -p 2223
If you want to learn the content of this CTF:
Linux Fundamentals: Part 3 – Workflow
🖥️ HTD Lab: INDEX
Connect via SSH and answer the questions below.
Username: dome-scout / Password: Oper@tion_Sh3ll!.
