The Challenge VM uses DHCP to obtain an address. The LUKS passphrase is: thispasswordisreallylongbutnotverygood The user 'cmiyc' is important in all challenges. There are a number of sets of hashes embedded in the VM. There may be multiple ways to obtain each set. Each set has 1000 possible hashes. There are a number of ways 'in' to this VM, all of them well documented and easy to find. There should be no need for extensive vulnerability scanning or exploit writing. Forensic recovery is possible for some lists, however, it would probably take less time to exploit services than it would to try and carve the files out. When you extract hashes, crack them and submit them just like any other plaintexts you crack during the contest. More information may be published during the contest.