diff --git a/scenarios/ctf/feeling_blu.xml b/scenarios/ctf/feeling_blu.xml
index 91f135042..1f1887ee2 100644
--- a/scenarios/ctf/feeling_blu.xml
+++ b/scenarios/ctf/feeling_blu.xml
@@ -174,8 +174,9 @@
password
- Username
+ Creds:
organisation
+ password
diff --git a/scenarios/ctf/feeling_blu_brute.xml b/scenarios/ctf/feeling_blu_brute.xml
new file mode 100644
index 000000000..91f135042
--- /dev/null
+++ b/scenarios/ctf/feeling_blu_brute.xml
@@ -0,0 +1,227 @@
+
+
+
+
+ Feeling Blu
+ Z. Cliffe Schreuders
+ Hack the web_server from kali.
+
+
+ ctf
+ attack-ctf
+ pwn-ctf
+ medium
+
+
+
+ authentication
+ passwords and alternatives
+
+
+ user authentication
+ BRUTEFORCE
+
+
+ server-side misconfiguration and vulnerable components
+ FILE UPLOAD VULNERABILITY
+
+
+ EXPLOITATION
+ EXPLOITATION FRAMEWORKS
+
+
+ CVEs and CWEs
+
+
+ PENETRATION TESTING - SOFTWARE TOOLS
+ PENETRATION TESTING - ACTIVE PENETRATION
+
+
+
+
+ access control
+ Elevated privileges
+ Vulnerabilities and attacks on access control misconfigurations
+
+
+ Access controls and operating systems
+ Linux security model
+ Attacks against SUDO
+
+
+
+ kill chains
+
+
+ cyber kill chain
+
+
+
+
+ symmetric encryption and authentication
+
+
+ BRUTEFORCE
+
+
+
+
+ attack_vm
+
+
+
+
+
+ 172.16.0.2
+
+ 172.16.0.3
+
+
+
+
+ {"username":"kali","password":"kali","super_user":"true","strings_to_leak":[],"leaked_filenames":[]}
+
+
+
+
+
+ {"username":"kali","password":"kali","super_user":"true","strings_to_leak":[],"leaked_filenames":[]}
+
+
+ false
+
+
+
+
+
+
+
+
+ IP_addresses
+
+
+
+
+
+
+
+ spoiler_admin_pass
+
+
+
+
+
+ web_server
+
+
+
+
+
+ lib/resources/structured_content/organisations/json_organisations
+
+
+
+
+
+
+
+
+ wordlist
+
+
+ 6
+
+
+
+
+
+
+
+
+
+
+ organisation
+
+
+ password
+
+
+ false
+
+
+ flag
+
+
+
+
+
+
+
+
+
+
+
+
+
+ organisation
+
+
+ organisation
+
+
+ password
+
+
+ Username
+ organisation
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ organisation
+
+
+
+
+ Congratulations you have cracked our protected zip file. Here is a flag for your troubles.
+
+
+
+
+
+ whatsmyname.zip
+
+
+ /root
+
+
+
+
+
+
+ IP_addresses
+
+
+
+
+ spoiler_admin_pass
+
+
+
+
+
diff --git a/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml b/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml
index 29e4c3336..e62b52b3f 100644
--- a/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml
+++ b/scenarios/labs/introducing_attacks/8_vulnerability_analysis.xml
@@ -41,15 +41,6 @@ Throughout this lab, you will learn how to use Nmap and its Nmap scripting engin
172.16.0.3
-
-
-
-
-
-
- flag
-
-
@@ -60,7 +51,7 @@ Throughout this lab, you will learn how to use Nmap and its Nmap scripting engin
-
+
IP_addresses
@@ -68,6 +59,15 @@ Throughout this lab, you will learn how to use Nmap and its Nmap scripting engin
+
+
+
+
+
+
+ flag
+
+