Irked

Awesome beginner machine. Really good for those getting used to pentesting and a little fun CTF type challenge for user

Foothold: Enumerate! You don’t need anything besides nmap and msfconsole

User: a CTF like challenge. Find the first piece of the puzzle doing basic enumeration of files and directories and then the second piece is just thinking about what you may have seen already if you visited the ports from nmap.

Root: This part is really trivial, although remember the machine is called Irked for a reason, so what is needed for doing the privesc maybe hiding in plain site, just think of the normal privesc methods (cron jobs, PATH, setuid, kernel, sudo rights) and go through them. HINT: you don’t need a kernel exploit here.

So far this is my favorite ‘beginner’ box that I’ve done.