running Room 12 : Join the game

Virtual environnement to attack can be reached at : ctf12.root-me.org
Time remaining : 00:46:38

Informations

  • Virtual environnement chosen : Sambox v4
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "SamBox v4"

    You are mandated to conduct a redteam assessment of a company. From the company’s parking garage you managed to capture Wi-Fi traffic, but alas it’s proven impossible to crack the WPA key. The next logical step is to attack the company through the internet.

    Your objective is to obtain total control of all servers so that you may collect individual flags for each of them.

    The flag to validate is made as following "flag server1 content+flag server2 content+flag server3 content+flag server4 content" without the "+".

    The CTFATD validation file « passwd » is in the directory « C :\Documents and Settings\Administrator> ».

    Note :
    The downloadable archive is to be decrypted using the contents of the "2nd-part-flag.txt" as a password. By using this archive you should then be able to understand the joined PCAP file.

    Download the files before launching the CTF :

    Also, don’t forget that :

    • this CTF has several machines to pwn
    • only one of those is connected to the internet Game duration : 240 min
  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf01 waiting 0
ctf02 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:50:33
1
Florent Caux
ctf03 SamBox v2 running
Time remaining : 02:07:50
1
Hacktimel
ctf04 OpenClassrooms - DVWA running
Time remaining : 00:03:20
1
Xeus
ctf05 AppArmorJail1 running
Time remaining : 00:52:38
3
mzahi, Adoew, ledoug
ctf06 SamBox v1 running
Time remaining : 00:29:01
1
Wiifou
ctf07 Nodeful running
Time remaining : 02:15:11
1
Nurgalym Jambul
ctf08 Windows - KerbeRoast running
Time remaining : 01:12:00
1
MoDa
ctf09 End Droid running
Time remaining : 03:16:11
2
Bigyls, goorst
ctf10 Websocket - 0 protection running
Time remaining : 01:18:23
1
peanut
ctf11 BreakingRootme2020 running
Time remaining : 00:43:12
1
sonwever
ctf12 Sambox v4 running
Time remaining : 00:46:38
1
cpt_mustard
ctf13 Shared Objects Hijacking running
Time remaining : 00:55:04
1
Id3m
ctf14 Metasploitable 2 running
Time remaining : 00:24:43
1
zen1me12
ctf15 Apprenti-Scraper running
Time remaining : 03:36:55
1
raaphael273
ctf16 Docker - Sys-Admin’s Docker running
Time remaining : 03:06:13
1
Sploups21
ctf17 Mr. Robot 1 running
Time remaining : 01:50:29
2
rHACK00n, anovman
ctf18 waiting 0
ctf19 waiting 0
ctf20 waiting 0
ctf21 LAMP security CTF5 running
Time remaining : 01:44:48
1
b4n3
ctf22 waiting 0
ctf23 BBQ Factory running
Time remaining : 06:49:06
1
siqox
ctf24 waiting 0
ctf25 waiting 0
ctf26 waiting 0
ctf27 waiting 0
ctf28 waiting 0
ctf29 waiting 0
ctf30 waiting 0
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf34 waiting 0
ctf35 waiting 0

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Metasploitable 2 0 4 March 2019 at 01:40 -
- Metasploitable 1 4 March 2019 at 04:13 -
- VulnVPN 0 4 March 2019 at 08:21 -
- Awky 0 3 March 2019 at 23:29 -
- LAMP security CTF5 3 3 March 2019 at 23:24 -