CTF – INDEX

Com certeza! Aqui está a tradução completa para o inglês, seguindo o tom profissional e focado em segurança da HTD Academy:


🕵️‍♂️ Mission: Operation Deep Scan

Mission Scenario

Agent dome-scout, the first phase of the infiltration was successful.

The “The Shell” server has been mapped, but security has been alerted to the initial breach. The system administrator has cleaned the logs and tightened visible security.

Your new mission is to go beyond the obvious. We need you to investigate the depths of the filesystem and the metadata to extract critical information that the administrator didn’t expect you to look for. You must map the user’s activity history file and, crucially, inspect the digital signature (Inode) of the privileges file (sudoers).

Accessing these Inode numbers is the first step in creating an undeniable chain of evidence.

Proceed with caution and depth. The Dome is waiting.


📂 Access Data (Briefing)

  • Target: htd-recon-lab Server
  • Protocol: SSH
  • Port: 2223
  • User: dome-scout
  • Password: Oper@tion_Sh3ll!

🧠 Learning Objectives (Concepts Covered)

By completing this challenge, you will master essential skills that separate the basic user from the security investigator:

  1. Hidden File Reconnaissance: Using commands to list and identify hidden configuration and history files (those starting with . in Linux).
  2. Filesystem Metadata (Inodes): Understanding that every file in Linux has a unique index number (Inode). This is fundamental for digital forensics and linking files to storage.
  3. User Configuration Files: Understanding the purpose of user files like .bash_history (the trail of user activity).
  4. Using the stat Tool: Utilizing commands that access low-level metadata instead of just the file content.

If you don’t now how to install or use Docker, read the link bellow

The Definitive Guide to Docker: Architecture, Installation, and Management


Download the machine from github and start it

git clone https://github.com/suricatoti/index.git

cd index

docker build -t htd/index:v1 .

docker run -d -p 2223:22 --name htd-index-lab --mount type=volume,source=htd_ssh_keys,target=/etc/ssh/ localhost/htd/index:v1

ssh dome-scout@localhost -p 2223

If you want to learn the content of this CTF:

Linux Fundamentals: Part 3 – Workflow


🖥️ HTD Lab: INDEX

Connect via SSH and answer the questions below.

Username: dome-scout / Password: Oper@tion_Sh3ll!.