LAMPSecurity.org is pleased to announce the release of the second in our series of capture the flag exercises. Like the previous release (http://lampsecurity.org/capture-the-flag-4), this exercise is a full Linux virtual machine that is vulnerable to remote root compromise due to a number of vulnerabilities. This exercise is notable in that it includes the use of a 0-day exploit.