Virtual environnement to attack can be reached at : ctf22.root-me.org
Time remaining : 01:26:27
Informations
- Virtual environnement chosen : SAP Pentest
- Description : Attention : this CTF-ATD is linked to the challenge "SAP Pentest 000" and "SAP Pentest 007"
The company BS-CORP decided to have an ERP to fulfils its potential.
However, they wondered whether the data are safe.
To verify this, you are mandated to perform a pentest on their new application.
Get the flag in the file /passwd to validate this CTF.
The challenges "SAP Pentest 007" and "SAP Pentest 000" on RootMe give you more goals. Game duration : 240 min - Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- hackoys (choice : SAP Pentest, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | Awky | 1 | 4 March 2019 at 11:41 | - |
- | Hopital Bozobe | 0 | 4 March 2019 at 10:10 | - |
- | /dev/random : Pipe | 1 | 4 March 2019 at 09:51 | - |
- | Metasploitable | 1 | 4 March 2019 at 11:32 | - |
- | Metasploitable 2 | 2 | 4 March 2019 at 09:07 | - |