Skip to main contentSkip to main content
Room Banner
Room Icon

K2

Premium room

Are you able to make your way through the mountain?

hard

180 min

2,016

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

You have been asked to run a vulnerability test on the K2 network in order to see if there is any way that a malicious actor would be able to infiltrate.

The IT team assures you that the network is secure and that you won't be able to make your way up the mountain.

They have only provided you with their external website called k2.thm.

Please allow 3-5 minutes for the to fully start.

Answer the questions below
What is the user flag?

What is the root flag?

What are the usernames and passwords that had access to the server? List the usernames in alphabetical order with their corresponding password separated by a comma. Format is username:password.

Two users have their full names on display. What are their names? In Alphabetical order. Format is first name last name separated by a comma.

Ready to learn Cyber Security?

The K2 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.