HAR CTF

Vulnerable Image

The vulnerable image contains a (unix-) system with the vulnerable services preinstalled. A copy is distributed to each team; each team runs the vulnerable image (using qemu/kvm or virtualbox) and assigns it a specific IP. The teams then attack each other's vulnerable image.