Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
blue-team
incident response
privilege-escalation
lateral-movement
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
blue-team
incident response
privilege-escalation
lateral-movement
Welcome to "Systems, Inc.", an IT infrastructure and management company. Today, there’s a crisis: the main web service is unstable, crashing repeatedly. This isn’t a random failure; the anomalies point to deliberate sabotage by an internal "impostor".
Your mission is clear: restore the website permanently and unmask the culprit to neutralize the threat at its source.
This lab will challenge you to:
1https:/cybersecurity-machines/the_imposter_lab.ova
Import the machine into VirtualBox.
Log in as user student:4geeks_lab
.
When you connect, the main website (the VM’s IP from your browser) will be down or constantly interrupted. Your goal is to stop this sabotage.
Investigate the system:
sudo
access initially; the key is lateral movement and gathering clues to escalate privileges. Look for configurations, unusual files, or communications that reveal the sabotage. Each user may hold a piece of the puzzle.Neutralize the sabotage:
root
access to disable the attack.Unmask the impostor and capture the Flag:
Only when you have identified the impostor and are root
, use the following command in the terminal to validate the impostor’s name:
1validate-imposter-name
Impostor identified!
Flag: 4GEEKS{EXAMPLE_FLAG}
Think like a cybersecurity detective. Every clue is valuable.
Good luck, Analyst!
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
blue-team
incident response
privilege-escalation
lateral-movement
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
blue-team
incident response
privilege-escalation
lateral-movement
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
blue-team
incident response
privilege-escalation
lateral-movement
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
blue-team
incident response
privilege-escalation
lateral-movement
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
blue-team
incident response
privilege-escalation
lateral-movement
Difficulty
intermediate
Average duration
2 hrs
Technologies
linux
cybersecurity
blue-team
incident response
privilege-escalation
lateral-movement