Skip to content

Latest commit

 

History

History
9 lines (5 loc) · 456 Bytes

SCENARIO_3.md

File metadata and controls

9 lines (5 loc) · 456 Bytes

Scenario 3

After talking to his teammate, the guy is sure the clusters are secure. He calls back his manager to tell him they can start the bounty program.

You know this is incorrect and you don't want anyone else to use this vulnerability. Now it's time to fix the configuration problem you used to get the SSH key.

You will find your next flag while correcting the related config file.

Scenario 2 | Scenario 4