The Rekall CTFs are the Project 2 deliverable(s) from the Cybersecurity class taken in 2023. The deliverable for the project was a penetration test report for Rekall’s Web app, linux server, and windows server. Split into 3 days, the CTF on day 1 was a pen test on Rekall’s web app, day 2 was targetting the linux servers, and day 3 targetting Windows. Although this “CTF” was only conducted within Rekall’s domain, it was split into 3 actual separate CTFS for the class, by day. As such, it has been split into 3 here on the site as well.

Day 2 of the CTF consisted of pentesting their Linux server. Although I will not go into extreme detail or a step by step walkthrough of the CTF (as I am sure this is a likely recycled project for other Cybersecurity classes, and would not want to spoil or give all information out on it), I will touch on some of the key elements from Day 2, and the delivered pen test report may be available upon request.

Some of the key vulnerabilities that were discovered:

  • Information leaked in DNS, SSL cert, and WHOIS record queries
  • Open system ports
  • Outdated services with open ports
  • Priv-Esc exploits
  • Plain-Text information

There were a total of 12 flags for this CTF, of which my group was able to find all 12 of them during the time alloted for Day 2. Compared to day 1 of the CTF, I felt much more prepared for the types of exploits needed to find most of the flags. Some of theme required simple record queries, and others required running exploits through a Linux tool Metasploit for RCE and other remote access to the systems. Once on the system there was an available priv-esc exploit that essentially allowed full compromise of the system at that point. My group seemed to fare a lot better during this day vs day 1.
See CTF 1 or CTF 3

Leave a Comment