• Vulnerable Machines Name :  SickOS_1.1 Point : 20
  • Operating System : Linux
  • Instructions :
  1. Download the VM and open in VirtualBox.
  2. Start Exploitation with your attacking system.
  3. At first find the User Flag, take the screenshot and submit it.
  4. After submitting the User Flag, then find the Root Flag, take the screenshot and submit it again.

N.B : After submitting the User Flag, open this box again and submit the Root Flag.