Our Scenarios
system exploitation

GeminiInc V1

Gemini Inc has contacted you to perform a penetration testing on one of their internal system. This system has a web application that is meant for employees to export their profile to a PDF. Identify any vulnerabilities possible with the goal of complete system compromise with root privilege. To demonstrate the level of access obtained, please provide the content of flag.txt located in the root directory as proof.

  • MODESINGLEPLAYER
  • TYPECPL
  • DIFFICULTYINTERMEDIATE
  • TIME60 MINUTES
  • COST10 CRYSTALS
SHARE