Recently
July 2023 ##CSAW2023 - Red Team Competition - New edition organized by Grenoble INP - Esisar in partnership with Root-Me PRO
For the 7th year running, Grenoble INP - ESISAR engineering school in Valence is hosting the European final of the cybersecurity competition - CSAW (Cyber Security Awareness Week) in November, bringing together participants from all over the world.
Once again this year, we are committed to raising awareness among young people by co-organizing “Red Team Competition”, event dedicated to high school students, with the obvious aim of sparking vocations among participants🔥.
This event will take place in two phases:
– September 14 to October 16: online qualification phase.
– November 10, 2023: final at the Grenoble INP ESISAR site in Valence.
Registrations are already open for the qualification phases👉 https://esisar.grenoble-inp.fr/fr/l-ecole/red-team
New challenges available!!
Our contributors are on fire 🔥 : 2 new challenges to discover, this time in the Web-Client category 🎉 .
Many thanks to the authors: Ruulian, mhoste, Lxt3h 👏!
CSP Bypass Nounce 2– Premium
Have fun and good luck to you all! 🚩
New challenges #Hackday available!!
Root-Me PRO supported the second edition of HackDay, held last May. In return, some of the creators of the CTF challenges were keen to share their creations on the Root-Me platform. 👐🏻
We would like to thank them for this initiative and for their contribution to the benefit of the entire community: Elf and blackjack 👏🙏🏼!
Here are 2 new challenges straight from the #Hackday2023 final, to be experienced in the Web-Server and Forensic categories:
New Programming challenges available on Root-Me ‼️

Community members are constantly working to adapt our content, so 4 new programming challenges based on the TCP protocol replace their historical IRC versions dating back to the Top 100 first challenges on the platform 🎉.
They are now available on the #RootMe and Root-Me Pro environments.
Thanks to the creators Nishacid and M4tou for their hard work!!!
– TCP - Back to school
– TCP - Encoded string
– TCP - The Roman Wheel
– TCP - Uncompress Me
New series of Network challenges!
Proud to score 100% on Network challenges? We have 2 new great challenges for you, and you’ll have to dive back into it if you want to keep your max score in this category!! 😈
OSPF – Authentification
ARP Spoofing - Active listening - Premium
A new type of resource available for PREMIUM and Root-Me PRO users!

📝💡VULNERABILITY SHEETS 💥💻
The objective: to provide you with a useful summary for understanding the concepts implemented within each challenge.
They include:
– A description introducing the vulnerability and its main characteristics
– A list of prerequisites detailing the knowledge and tools that can help to exploit the vulnerability
– A typical execution flow aimed at structuring the identification of the vulnerability
– The consequences of exploitation as well as the countermeasures that can be implemented
– Practical examples of an exploitation scenario and/or examples of vulnerable codes or configurations.
– Pointers to external resources related to the vulnerability (reference documents, blogs, documentation, etc.)
📍Where to find them? They are integrated on the challenge page.
About thirty of these sheets are already available, and many more are to come 🚀!
Get ready for the Stranger Case: the 100% OSINT CTF!

Organized by the students of ESNA Bretagne, the CTF Stranger Case is a unique event in France and exclusively OSINT oriented.
The second edition of this CTF will take place in two parts:
📆 27 May 2023 from 10:00 am: remote qualification phase.
📆 July 1, 2023: live final phase for the finalists, organised in collaboration with the HUNT of the Ecole de Guerre Economique - EGE and ...leHack.
Conditions to become an Agent 🕵️: the investigation is open to anyone interested in OSINT and digital investigation in general. Participation in teams (4 people maximum).
Teaser of the adventure 👀: https://www.youtube.com/watch?v=OJeaW_gtW7Y&t=2s
Are you ready for the Stranger Case? Recruitment is open here: https://strangercase.org/
The Root-Me blog is online !

As you know, the spirit of Root-Me is SHARING. So we are very happy to announce the release of our blog 😊.
What will you find there?
- Documentations,
– CTFs write-ups,
– Articles related to cybersecurity,
– Interviews with our members: because the strength of Root-Me is its community, we thought it would
be nice to share with you the particular stories of some of our members, whether they are beginners, have made a career change or are already experts....
A great way to get advice and inspiration from the Root-Me community! 🔥
💡 Check out the 1st interview with M4tou who launched this new format! He tells us his career transition into cybersecurity after a career as a marine navigation expert. 🧭 🚢
Find out all about it here: https://blog.root-me.org/
[📝If you too would like to contribute, it would be a pleasure: contact us! => @Member section on the Root-Me Discord : https://discord.gg/rootme ]
New challenges available!!

Four new challenges in the App-Script, Steganography and Cracking categories have just been published on the Root-Me and Root-Me Pro environments.
Many thanks to Nivram, LetMeR00t, Sengengie, Stealer, LordRoke and S01den for creating these challenges!
App Armor - Jail Introduction
GeniusID
HackerMan(premium)
PE x64 - UEFI Secure Boot
Have fun and good luck to you all! 🚩