HAR CTF
Vulnerable Image
The vulnerable image contains a (unix-) system with the vulnerable services preinstalled. A copy is distributed to each team; each team runs the vulnerable image (using qemu/kvm or virtualbox) and assigns it a specific IP. The teams then attack each other's vulnerable image.