running Room 11 : Join the game

Virtual environnement to attack can be reached at : ctf11.root-me.org
Time remaining : 01:06:23

Informations

  • Virtual environnement chosen : AppArmorJail1
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "AppArmor Jail - Introduction"

    When connecting to the administrator’s server, a restricted shell via an AppArmor policy prevents you from reading the flag even though you are the owner...

    Find a way to read the flag at any cost and override the AppArmor policy in place which is configured as follows:

    #include <tunables/global>

    profile docker_chall01 flags=(attach_disconnected,mediate_deleted) {
       #include <abstractions/base>
       network,
       capability,
       file,
       umount,
       signal (send,receive),
       deny mount,

       deny /sys/[^f]*/** wklx,
       deny /sys/f[^s]*/** wklx,
       deny /sys/fs/[^c]*/** wklx,
       deny /sys/fs/c[^g]*/** wklx,
       deny /sys/fs/cg[^r]*/** wklx,
       deny /sys/firmware/** rwklx,
       deny /sys/kernel/security/** rwklx,

       deny @{PROC}/* w,   # deny write for all files directly in /proc (not in a subdir)
       # deny write to files not in /proc/<number>/** or /proc/sys/**
       deny @{PROC}/{[^1-9],[^1-9][^0-9],[^1-9s][^0-9y][^0-9s],[^1-9][^0-9][^0-9][^0-9]*}/** w,
       deny @{PROC}/sys/[^k]** w,  # deny /proc/sys except /proc/sys/k* (effectively /proc/sys/kernel)
       deny @{PROC}/sys/kernel/{?,??,[^s][^h][^m]**} w,  # deny everything except shm* in /proc/sys/kernel/
       deny @{PROC}/sysrq-trigger rwklx,
       deny @{PROC}/kcore rwklx,

       /home/app-script-ch27/bash px -> bashprof1,
     
    }
    profile bashprof1 flags=(attach_disconnected,mediate_deleted) {
       #include <abstractions/base>
       #include <abstractions/bash>
       
       network,
       capability,
       deny mount,
       umount,
       signal (send,receive),

       deny /sys/[^f]*/** wklx,
       deny /sys/f[^s]*/** wklx,
       deny /sys/fs/[^c]*/** wklx,
       deny /sys/fs/c[^g]*/** wklx,
       deny /sys/fs/cg[^r]*/** wklx,
       deny /sys/firmware/** rwklx,
       deny /sys/kernel/security/** rwklx,

       deny @{PROC}/* w,   # deny write for all files directly in /proc (not in a subdir)
       # deny write to files not in /proc/<number>/** or /proc/sys/**
       deny @{PROC}/{[^1-9],[^1-9][^0-9],[^1-9s][^0-9y][^0-9s],[^1-9][^0-9][^0-9][^0-9]*}/** w,
       deny @{PROC}/sys/[^k]** w,  # deny /proc/sys except /proc/sys/k* (effectively /proc/sys/kernel)
       deny @{PROC}/sys/kernel/{?,??,[^s][^h][^m]**} w,  # deny everything except shm* in /proc/sys/kernel/
       deny @{PROC}/sysrq-trigger rwklx,
       deny @{PROC}/kcore rwklx,

       / r,
       /** mrwlk,
       /bin/** ix,
       /usr/bin/** ix,
       /lib/x86_64-linux-gnu/ld-*.so mrUx,
       deny /home/app-script-ch27/flag.txt r,
    }
    • Start the CTF-ATD "AppArmorJail1"
    • Connect via SSH to the machine on port 22222 (app-script-ch27:app-script-ch27)
    • The challenge validation password is in the /home/app-script-ch27/flag.txt file
    • The validation password of the CTF ATD is in the file /passwd

    Start the challenge Game duration : 240 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf01 OpenClassrooms - DVWA running
Time remaining : 00:08:25
2
1234, HENRI BOUTLEY
ctf12 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:17:10
1
David Sargenton-Charles-Gervais
ctf21 SamBox v3 running
Time remaining : 01:36:48
1
@OG
ctf20 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:34:12
1
ph03n
ctf19 Websocket - 0 protection running
Time remaining : 01:43:19
1
Overmind
ctf02 getting-root-over-it-v1 running
Time remaining : 03:03:20
1
dlucasdoo
ctf17 Matrix terminal running
Time remaining : 02:25:05
1
kernoeb
ctf16 SSRF Box running
Time remaining : 01:17:51
1
amirshirdel
ctf15 LAMP security CTF5 running
Time remaining : 02:42:23
1
Nathan
ctf14 Exploit KB Vulnerable Web App running
Time remaining : 01:00:03
1
Fatima SOW
ctf18 Bluebox - Microsoft Pentest running
Time remaining : 01:34:36
1
sonce
ctf11 AppArmorJail1 running
Time remaining : 01:06:23
1
Amaterasu
ctf09 Matrix terminal running
Time remaining : 02:16:31
1
littleballoon
ctf08 Texode running
Time remaining : 02:14:38
2
Nefbou123, mrrobott
ctf07 ARM FTP box running
Time remaining : 02:53:28
1
Yakup Kizilirmak
ctf06 Docker - I am groot running
Time remaining : 02:10:00
1
0x5444
ctf05 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:57:57
1
Guillaume Santacruz
ctf04 End Droid running
Time remaining : 02:11:08
4
devilsharu, SpaceTurtle, Bandit, Leo
ctf03 Apprenti-Scraper running
Time remaining : 00:43:50
2
adamoumou, alica
ctf28 waiting 0
ctf34 waiting 0
ctf33 waiting 0
ctf32 waiting 0
ctf31 waiting 0
ctf30 waiting 0
ctf29 waiting 0
ctf24 waiting 0
ctf27 waiting 0
ctf26 waiting 0
ctf25 waiting 0
ctf13 waiting 0
ctf23 waiting 0
ctf22 waiting 0
ctf10 waiting 0
ctf35 waiting 0

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Awky 3 3 March 2019 at 21:28 -
- Mr. Robot 1 1 3 March 2019 at 20:59 -
- LordoftheRoot 0 3 March 2019 at 20:56 -
- Metasploitable 1 4 March 2019 at 08:03 -
RadekG SSH Agent Hijacking 1 3 March 2019 at 20:57 0h12