WELCOME TO THE MATRIX CTF

You are about to enter a simulated construct. Your mission: find five flags, prove you can bend the rules.
Challenges
SSH Crack · Web SQLi · Web RCE · Redis Leak · FTP Drop
Connect
Web: http://50.116.28.213:31381/
SSH: 50.116.28.213:32222
Redis: 50.116.28.213:6380
FTP: 50.116.28.213:3021
Rules
Only test targets provided by your instructor. Be kind to the matrix.
Tips
Enumerate first. Keep notes. Submit flags on the main page.
ENTER THE MATRIX

About this CTF

This bootstrapped exercise (the Matrix CTF) is a short, instructor-hosted set of five beginner-to-intermediate challenges designed to teach practical offensive-security skills. The challenges cover common techniques students should practice:

  • SSH — remote-service access; practice with port scans, login enumeration, and weak-credential discovery.
  • Web SQL Injection — learn to identify unsafe SQL usage in web apps and how to safely extract useful fields.
  • Web RCE (Remote Code Execution) — understand how unsafe eval/exec patterns can be abused to read files or run commands.
  • Redis — explore how misconfigured data stores can unintentionally expose sensitive keys or values.
  • FTP — classic file-retrieval vector; check anonymous or public upload directories.