You have been called to analyze a compromised Linux server. Figure out how the threat actor gained access, what modifications were applied to the system, and what persistent techniques were utilized. (e.g. backdoors, users, sessions, etc).
CTF.io configuration on RedHat Enterprise Linux (Part 1).
Previously, I had participated in Trace Labs virtual CTF on July 13 which my experience can be read at Trace Labs Global Remote 2 CTF.
On July 13, Over 200 persons (which including myself) participated in Trace Labs's Global Remote 2 for missing persons. This was my first CTF for cyber security or intelligence and it was enjoyable.