running Room 26 : Join the game

Virtual environnement to attack can be reached at : ctf26.root-me.org
Time remaining : 02:45:16

Informations

  • Virtual environnement chosen : The Ether : EvilScience
  • Description : 

    Introduction

    Lately, I’ve been enjoying creating hacking challenges for the security community. This new challenge encapsulates a company, entitled – The Ether, who has proclaimed an elixir that considerably alters human welfare. The CDC has become suspicious of this group due to the nature of the product they are developing.

    The Goal

    The goal is to find out what The Ether is up to. You will be required to break into their server, root the machine, and retrieve the flag. The flag will contain more information about The Ether’s ominous operations regarding this medicine.

    Any Hints?

    This challenge is not for beginners. There is a relevant file on this machine that plays an important role in the challenge, do not waste your time trying to de-obfuscate the file, I say this to keep you on track. This challenge is designed test you on multiple areas and it’s not for the feint of heart!

    Last Words

    Whatever you do, do not give up! Exhaust all of your options! Looking forward to have OSCPs take this challenge. As always, good luck, have fun, God bless, and may the s0urce be with you. Game duration : 240 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf01 Well-Known running
Time remaining : 03:57:01
1
mire
ctf02 Well-Known running
Time remaining : 03:57:56
1
Rob
ctf03 waiting 0
ctf04 waiting 0
ctf05 AppArmorJail1 running
Time remaining : 01:56:44
1
Dexiios
ctf06 Windows - ASRepRoast stopping 2
yep, heirim12
ctf07 LAMP security CTF5 running
Time remaining : 03:39:44
1
b4n3
ctf08 Windows - KerbeRoast running
Time remaining : 00:18:18
1
Gringo
ctf09 End Droid running
Time remaining : 00:18:01
4
Bigyls, goorst, Kamila, Victoire
ctf10 Metasploitable 2 running
Time remaining : 00:43:28
2
blackr3se, Mando
ctf11 Shared Objects Hijacking running
Time remaining : 00:21:38
1
Incinscible
ctf12 root-me-spip running
Time remaining : 02:55:24
1
darkveiderg
ctf13 OpenClassrooms - DVWA running
Time remaining : 02:57:49
1
rob
ctf14 waiting 0
ctf15 Apprenti-Scraper running
Time remaining : 00:38:45
2
val, raaphael273
ctf16 waiting 0
ctf17 waiting 0
ctf18 Windows - sAMAccountName spoofing running
Time remaining : 01:46:49
1
0xSpectra
ctf19 Docker - Talk through me running
Time remaining : 01:24:35
1
Neriss
ctf20 waiting 0
ctf21 waiting 0
ctf22 waiting 0
ctf23 waiting 0
ctf24 waiting 0
ctf25 waiting 0
ctf26 The Ether : EvilScience running
Time remaining : 02:45:16
1
Usurper
ctf27 waiting 0
ctf28 waiting 0
ctf29 waiting 0
ctf30 waiting 0
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf34 waiting 0
ctf35 waiting 0

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Awky 1 4 March 2019 at 11:41 -
- Hopital Bozobe 0 4 March 2019 at 10:10 -
- /dev/random : Pipe 1 4 March 2019 at 09:51 -
- Metasploitable 1 4 March 2019 at 11:32 -
- Metasploitable 2 2 4 March 2019 at 09:07 -