running Room 2 : Join the game

Virtual environnement to attack can be reached at : ctf02.root-me.org
Time remaining : 02:08:04

Informations

  • Virtual environnement chosen : OpenClassrooms - DVWA
  • Description : 

    This environment makes available the vulnerable web application DVWA, by the OWASP. It is offered by Root Me and OpenClassrooms as part of the OpenClassrooms course Réalisez un test d’intrusion Web.
    It allows you to carry out several tests explained during the course at your own pace in order to get to grips with the tools, the method and the results obtained: robustness of flow encryption, XSS, SQL injection, path traversal, etc.
    Once the fundamentals are mastered, you can practice on the realistic application Juice Shop, thanks to the OpenClassrooms - Juice Shop environment. Game duration : 240 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf20 waiting 0
ctf19 waiting 0
ctf17 waiting 0
ctf22 waiting 0
ctf23 waiting 0
ctf24 waiting 0
ctf25 waiting 0
ctf26 waiting 0
ctf27 waiting 0
ctf28 waiting 0
ctf29 waiting 0
ctf30 waiting 0
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf34 waiting 0
ctf21 A bittersweet shellfony running
Time remaining : 01:44:27
1
Usern4me
ctf01 Well-Known running
Time remaining : 00:12:28
1
Anonymous
ctf18 Docker - Sys-Admin’s Docker running
Time remaining : 03:50:11
1
saSHA256
ctf16 Relative Path Overwrite running
Time remaining : 01:03:55
1
MrB0hl00l
ctf14 Docker - I am groot running
Time remaining : 02:38:42
1
Open
ctf13 OpenClassrooms - Juice Shop running
Time remaining : 02:32:46
1
Araharah
ctf12 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:27:54
1
Augustin Alliod
ctf10 Gemini-Pentest-v1 running
Time remaining : 00:44:17
1
hacktivist
ctf09 Windows - KerbeRoast running
Time remaining : 00:25:23
1
Elias
ctf08 Windows - ZeroLogon running
Time remaining : 01:56:27
1
Dreyvor
ctf07 Windows - krbtgt reuse running
Time remaining : 01:17:01
1
lxcrack2020
ctf06 A bittersweet shellfony running
Time remaining : 00:41:21
1
sonwever
ctf05 Windows - ASRepRoast starting 1
freko28
ctf04 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:36:18
1
Laetitia Leguen
ctf03 Windows - KerbeRoast running
Time remaining : 01:00:39
1
m_lambert
ctf15 Apprenti-Scraper running
Time remaining : 01:23:53
2
Kaetir, thomy
ctf11 Docker - Sys-Admin’s Docker running
Time remaining : 01:24:36
2
pancak, Reda
ctf35 Bluebox 2 - Pentest running
Time remaining : 01:42:39
2
clomic, Winty
ctf02 OpenClassrooms - DVWA running
Time remaining : 02:08:03
3
laroche, 7even, Systemovitch

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Mr. Robot 1 1 26 February 2019 at 19:53 -
- SSRF Box 3 26 February 2019 at 19:38 -
- SamBox v1 1 26 February 2019 at 20:09 -
- Metasploitable 2 26 February 2019 at 21:00 -
ROBIL LAMP security CTF5 3 26 February 2019 at 18:46 1h51