Objective:
- The flag is in the folder /flag/flag.txt
- It can be entered on the iCSI Scoreboard.
For this challenge, you’ll need two VM’s
- You’ll need Kali Linux to solve this challenge.
- The VM hosting the vulnerable web application can be downloaded here.
You will not have access to the login credentials for this machine. We will need to discover the IP address once it is powered on. (Follow the setup directions right below this before powering it on.)
Open up the VM hosting the vulnerable web application in VMWare and give it a unique MAC address. (We’ll use arp-scan within Kali to locate its IP address in the next step.)
**(You can Double Click on these images to zoom in.)**

Start the vulnerable VM and then log into Kali Linux. We’ll be able to locate the IP address of the Vulnerable VM from Kali by running arp-scan and piping the results to grep.
- The -i flag used with grep below makes the search case insensitive. Not strictly necessary here, but helpful!
sudo su
arp-scan --localnet | grep **-i** MAC_ADDRESS_OF_VULNERABLE_VM

In my case, the IP Address of the target VM is 192.168.228.47.
NMAP results:
nmap -sC -sV 192.168.228.47

- We see that port 22 and port 80 are open.
- We can ignore port 22 for this challenge.