Virtual environnement to attack can be reached at : ctf04.root-me.org
Time remaining : 01:51:29
Informations
- Virtual environnement chosen : Bluebox 2 - Pentest
- Description : Attention : this CTF-ATD is linked to the challenge "Bluebox 2 - Pentest"
The JZ company and its subsudiary corporation BS ask you a pentest to see how far can dig a skilled hacker on Internet. Only the ctfxx.root-me.org fqdn is provided.
The CTF-ATD validation password is on DC1 in C:\passwd
Some useful informations about the company JZ:
– The Active Directory implies a strong password policy. Bruteforcing the Windows Administrator account is pointless.Don’t forget :
– It’s a CTF made of several machines;
– Only one of these machines is accessible through Internet. Game duration : 240 min - Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- clomic (choice : Bluebox 2 - Pentest, ready)
- apologize (choice : SSH Agent Hijacking, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | Vulnix | 3 | 2 March 2019 at 21:51 | - |
- | Imagick | 1 | 3 March 2019 at 10:55 | - |
- | CsharpVulnJson | 0 | 2 March 2019 at 23:45 | - |
Ch3n4p4N | SSH Agent Hijacking | 1 | 2 March 2019 at 21:42 | 0h07 |
- | Acid: Server | 0 | 2 March 2019 at 22:38 | - |