The Learn section provides topic-style lessons with detailed information required to attempt challenges. Some challenges here are really easy to set up, especially web challenges. Challenge files will always be in the first lesson and used in the rest of the lessons.
The Hack section is the area for competitive style hacking, with beginner to advanced machines to test yourself on. We will only make realistic challenges that would appear in industry (no puzzle style challenges).
Prerequisite Files
Microsoft Visual C++ RedistributableSome VMs (especially Windows-based) require the Microsoft Visual C++ Redistributable runtime to function properly.
Download the latest supported VC++ Redistributables
- Download and install the version matching your OS's architecture (most modern systems use x64).
- Double-click the downloaded file and follow the prompts to install.
- Restart your computer after installation.
VirtualBox
- Search for "virtualbox" in your browser and click the first link (virtualbox.org), or visit virtualbox.org directly.
-
Click on Download, then select the right download for your operating system:
- Windows: Click "Windows hosts" to download the .exe file.
- macOS: Click "OS X hosts" to download the .dmg file.
- Linux: Select your distribution or use the generic Linux download.
-
Go through the default installation steps:
- Windows: Run the .exe file and accept the default options. Approve any Windows driver warnings.
- macOS: Open the .dmg, double-click VirtualBox.pkg, and follow the prompts.
- Install any dependencies required during the installation process.
-
Navigate to the Learn or Hack section on CYBERPLUNDER and select the challenge you want to attempt.
- Learn Section: Detailed lessons with challenges at the bottom. Challenge files are always in the first lesson.
- Hack Section: Direct competitive hacking challenges.
- Download the challenge .ova file from the selected challenge page.
-
Import the challenge into VirtualBox:
- After download completes, the file should automatically import to VirtualBox when opened.
- If it doesn't auto-import, go to File > Import Appliance and select the .ova file.
- Click Finish to complete the import process.
- Start the challenge VM by selecting it and clicking Start.
-
E.g. For Web App Challenges:
- Copy the IP address listed in the challenge description.
- Paste it into your browser address bar to access the web challenge.
- No additional attacker box setup is required for web challenges.
- Attacking box VM: If you would like a seperate attacking box VM (such as kali) to use instead of your host system, follow the instructions below.
-
You have two options for your attacking machine:
- Option 1 (Use Your Host System): Hack directly from your computer. Your listener IP address will be 192.168.56.1 (the default VirtualBox Host-Only Adapter IP).
- Option 2 (Recommended - Kali Linux VM): Set up a dedicated Kali Linux virtual machine for attacking. Continue with the steps below.
-
To set up Kali Linux VM:
- Search for "get kali" and go to the official Kali website, or visit Kali VMs
- Click on the Virtual Machine section and select the VirtualBox download.
- Ensure you have 7zip installed to extract the downloaded file.
-
Import the Kali VM:
- After extracting, go to the folder and double-click the .ova file (blue file icon).
- It should automatically import to VirtualBox.
-
Configure networking for the Kali VM:
- Right-click the Kali VM and select Settings.
- Ensure you are in Expert Mode and go to the Network tab.
- Adapter 1: Leave as NAT (for internet access)
- Adapter 2: Enable it and set it to Host-Only Adapter (to communicate with challenge boxes)
-
Start the Kali VM and log in:
- Default Kali credentials: kali:kali
- Open a terminal and type ip a
- Note the IP address of the second adapter (usually eth1) - this is your attacking IP for challenges.
- Windows Challenges: The treasure file is located on the Administrator user's desktop: C:\Users\Administrator\Desktop\treasure.txt or C:\Users\Bob\Desktop\treasure.txt
- Linux Challenges: The treasure file is located in the root directory: /root/treasure.txt
Challenge Setup
Attacker Box Setup
CLAIMING YOUR PLUNDER
After successfully hacking into a challenge VM, the treasure will always be stored in a specific location depending on the operating system:
Linux: cat /root/treasure.txt
Windows: type C:\Users\Administrator\Desktop\treasure.txt
Copy the entire contents of the MD5 hash from treasure.txt and paste it into the challenge window on CYBERPLUNDER to claim your plunder!
Click to Play
Video Demonstration