CYBERPLUNDER - OVA Setup
Welcome to CYBERPLUNDER! This is a brand new hacking platform so we'd love your support. There may a few glitches as we fine tune things, please let us know if you experience any at info@cyberplunder.com. We release new challenges and lessons monthly. We offer some lessons and the plunder for the month completely free. Then we have crewmate options to access more! You will earn a 1.5x bonus if you're the 1st to plunder, 1.3x if you're 2nd, and 1.1x if you're the 3rd. Stay tuned as we may offer prizes for the pirates with the most gold...

Prerequisite Files

Microsoft Visual C++ Redistributable
Some VMs (especially Windows-based) require the Microsoft Visual C++ Redistributable runtime to function properly.
Download the latest supported VC++ Redistributables
  • Download and install the version matching your OS's architecture (most modern systems use x64).
  • Double-click the downloaded file and follow the prompts to install.
  • Restart your computer after installation.
Restart your computer after installation, otherwise the VirtualBox installation may fail.

VirtualBox

  1. Download VirtualBox from the official site.
  2. Install VirtualBox:
    • Windows: Run the .exe file and accept the default options. Approve any Windows driver warnings.
    • macOS: Open the .dmg, double-click VirtualBox.pkg, follow the prompts, and allow security if needed under System Preferences > Security & Privacy.
    • Linux (Ubuntu/Debian): In terminal, run:
      sudo apt update && sudo apt install virtualbox -y
  3. Launch VirtualBox and confirm you see the VirtualBox Manager window.
If you encounter issues, visit the VirtualBox User Manual for troubleshooting.

Attacker Box Setup

  1. Download a Kali Linux or Ubuntu-based .ova or .iso image.
    Kali OVA: Kali VMs
  2. Import into VirtualBox:
    • OVA: Double-click to open/import, or in VirtualBox: File > Import Appliance → select your OVA file.
    • ISO: In VirtualBox, click New → follow prompts → for storage, attach ISO as virtual CD/DVD → install OS inside the VM as prompted.
  3. Set the network adapter to Bridged:
    • In VirtualBox Manager, select the VM → Settings > NetworkAttached to: Bridged Adapter.
    • Pick your active network interface (Wi-Fi/Ethernet) if needed.
  4. Start the VM and log in:
    • Default credentials for Kali: kali:kali
    • Change password if prompted.
  5. Update your OS:
    • Open terminal, run: sudo apt update && sudo apt upgrade -y

Challenge Setup

  1. Download the learn/hack challenge .ova file.
  2. Import into VirtualBox:
    • Double-click the .ova, or use File > Import Appliance.
    • Adjust RAM/CPU if necessary, but keep your system stable.
  3. Set the network adapter to Bridged (the same as the attacker box).
  4. Start the challenge VM. Default credentials may be provided with the challenge.
Both attacker and challenge VMs must be on the same network for discovery!

Finding Challenge

  1. On the attacker VM, open a terminal and run:
    ip a or ifconfig
    Note your IP address (e.g., 192.168.1.101).
  2. Determine your subnet (e.g., 192.168.1.0/24).
  3. Scan the local network for hosts:
    • nmap -sn 192.168.1.0/24 --exlude <your-ip-address> (e.g., 192.168.1.101)
    • Look for the only other VirtualBox IP. (e.g., 192.168.1.11)
  4. Run a port scan on the challenge IP to find services:
    • nmap -A <challenge_ip> (e.g., 192.168.1.11)
  5. Access services as directed by the challenge (e.g., for a web challenge, open http://<challenge_ip>:80 in a browser).
That’s it! The challenge is live. Have fun hacking!

PLUNDER

Once ye've conquered the challenge and seized the treasure.txt, submit its contents to claim your booty!

  • Linux Challenges: The treasure file is usually found at /root/treasure.txt
  • Windows Challenges: The treasure file is usually found at \Users\Administrator\Desktop\treasure.txt
Example:
cat /root/treasure.txt
or
type C:\Users\Administrator\Desktop\treasure.txt

Copy the entire contents of treasure.txt and submit it where instructed on the challenge.

treasure.txt is always in md5 form, e.g: 76af9ffd4b15dcdcf342dff4398cba4a
Go Back

Click to Play
Video Demonstration