Recently
September 2012 #New CSS architecture
Many things have changed regading CSS code, tables, forum UI for the visible part. For the not visible one, we have changed how we organize and manage our code.
Maybe themes soon, any volunteers ? 😉
NB : don’t forget to empty your cache
IRC server down
irc.root-me.org / irc.hackerzvoice.net server is down for the moment. The problem occured around 06:30 AM. We hope that everything will return to normal quickly.
Thanks for your patience 😉
Maintenance period
Maintenance period is now over. We’ve use this time to make significant changes to our back office to simplify challenges management.
Thx for you patience, good training 😉
Score’s calculation changed
The scoring is slightly different now : challenge’s creators no longer receive points for their own challenges but they can still validate them.
New virtual machine
A new virtual machine provided by Offensive Security is available for the CTF all the day : metasploitable 2.
Migration to SPIPv3
For those who have not yet noticed, Root-Me uses the CMS SPIP. A new major version (v3) is out. So we’ve traded our old v2 against the new v3.
No change to report for the public space. If you encounter problems / bugs, please report them.
New virtual machines
4 new virtual machines are available in CTF all the day :
– Kioptrix level 1
– Kioptrix level 2
– Kioptrix level 3
– Kioptrix level 4
Good training !
New virtual machines
5 new virtual machines are available in CTF all the day :
– Holynix v1
– Ultimate LAMP
– pWnOS
– Moth
– Exploit KB vulnerable webApp
Good training !
Solutions for challenges
You can now propose and / or consult solutions for each challenge:
– Everyone can see the solutions, those who have not validated the challenge will no longer be able to do so.
– Only those who have validated the chall can provide solutions.
NB: a solution describe a way among others to achieve the required goal.
Good training 😉
New service : wargame02.root-me.org
A new service is available : wargame02.root-me.org
You’ll find a new wargame in an hardened environnemnt (ASLR, stack cookies, GRsecurity, etc.) with binaries to reverse.
Challenges are in the wargame section.