Skip to content

remonsec/RedSentry-CTF-Challenge

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Red Sentry Financial App

CTF Challenge Machine

A vulnerable financial management application based on Firefly III, designed for RedSentry CTF challenge competition.

Quick Start

  1. Prerequisites: Docker and Docker Compose installed
  2. Run the application:
    docker-compose up -d
  3. Wait ~30 seconds for database seeding to complete
  4. Access the application: http://localhost:8080
  5. Login with any credentials below

Default User Credentials

The Docker build seeds comprehensive dummy data for testing. No manual setup required.

Admin Users (Full Access)

Regular Users (Standard Access)

Weak Credential Users (Easy Compromise)

Demo Users (Pre-configured)

Comprehensive Data Included

  • Accounts: 4–10 accounts per user (Checking, Savings, Investment, etc.)
  • Transactions: 14+ realistic transactions with historical data
  • Budgets: 5 budgets per user with spending limits
  • Categories: 10 predefined expense/revenue categories
  • Tags: 8 predefined tags for transaction organization

For RedSentry Pentest CTF Challenge Players

This application contains intentionally placed vulnerabilities for a RedSentry CTF challenge:

  • Use standard penetration testing methodologies
  • Document your findings and exploitation steps
  • Compete to find and exploit all vulnerabilities

Scope

  • Target: web app served at http://localhost:8080
  • In-scope: application endpoints, business logic, client-side behavior
  • Out-of-scope: direct DB access, SMTP delivery to real inboxes, attacking host/other containers, DoS
  • Goal: identify and exploit listed vulnerability classes and produce a concise report/PoC

Application Features

  • Financial account management
  • Transaction tracking
  • Budget management
  • Bill management
  • Category and tag organization
  • User management system

Database Access

Not required for the challenge. Focus on app-level testing with the provided user credentials.

Stopping the Application

docker-compose down

Notes

  • This is a CTF challenge machine - do not use in production
  • Vulnerabilities are intentional for competition purposes
  • Compete to find and exploit all vulnerabilities

Challenge: This application contains intentional security vulnerabilities for CTF competition.

About

Red Sentry CTF Challenge Machine - Vulnerable Financial App for Penetration Testing Competition

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published