To access material, start machines and answer questions login.
You have been asked to run a vulnerability test on the K2 network in order to see if there is any way that a malicious actor would be able to infiltrate.
The IT team assures you that the network is secure and that you won't be able to make your way up the mountain.
They have only provided you with their external website called k2.thm.
Please allow 3-5 minutes for the to fully start.
What is the root flag?
Two users have their full names on display. What are their names? In Alphabetical order. Format is first name last name separated by a comma.
Ready to learn Cyber Security?
The K2 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
