Room 13 : Join the game

Virtual environnement to attack can be reached at : ctf13.root-me.org
Time remaining : 03:56:29

Informations

  • Virtual environnement chosen : Sambox v4
  • Description : 

    You are mandated to conduct a redteam assessment of a company. From the company’s parking garage you managed to capture Wi-Fi traffic, but alas it’s proven impossible to crack the WPA key. The next logical step is to attack the company through the internet.

    Your objective is to obtain total control of all servers so that you may collect individual flags for each of them.

    The flag to validate is made as following "flag server1 content+flag server2 content+flag server3 content+flag server4 content" without the "+".

    The CTFATD validation file « passwd » is in the directory « C :\Documents and Settings\Administrator> ».

    Note :
    The downloadable archive is to be decrypted using the contents of the "2nd-part-flag.txt" as a password. By using this archive you should then be able to understand the joined PCAP file.

    Download the files before launching the CTF :

    Also, don’t forget that :

    • this CTF has several machines to pwn
    • only one of those is connected to the internet Game duration : 240 min
  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


 40 Available rooms

Room Virtual environnement chosen State Attackers count
ctf01 SSRF Box running
Time remaining : 02:49:59
1
ex0dus
ctf02 Hopital Bozobe running
Time remaining : 03:28:44
1
TEKABDJI Youcef
ctf03 zico2 running
Time remaining : 03:30:29
2
Rowan Sheridan, bayofosla
ctf04 SSRF Box running
Time remaining : 02:23:44
1
Vunnm
ctf05 SSH Agent Hijacking running
Time remaining : 00:48:14
1
Chriss
ctf06 - waiting 0
ctf07 LordoftheRoot running
Time remaining : 04:00:59
1
ELEGBEDE
ctf08 Awky running
Time remaining : 01:01:44
2
petithomme2005, 0x78585f4434724b5f433470556368306e5f5878
ctf09 64Base_3mrgnc3 running
Time remaining : 02:46:59
1
Simyellow
ctf10 Django unchained running
Time remaining : 02:12:44
2
nothereD, SerieS
ctf11 - waiting 0
ctf12 - waiting 0
ctf13 Sambox v4 running
Time remaining : 03:56:29
1
BENAMAROUCHE Abdelmoumen
ctf14 - waiting 0
ctf15 Bluebox 2 - Pentest running
Time remaining : 00:19:35
1
dinosn
ctf16 - waiting 0
ctf17 - waiting 0
ctf18 - waiting 0
ctf19 - waiting 0
ctf20 - waiting 0
ctf21 - waiting 0
ctf22 - waiting 0
ctf23 Bluebox 2 - Pentest running
Time remaining : 03:00:14
1
S0uND
ctf24 - waiting 0
ctf25 - waiting 0
ctf26 - waiting 0
ctf27 - waiting 0
ctf28 - waiting 0
ctf29 - waiting 0
ctf30 - waiting 0
ctf31 - waiting 0
ctf32 - waiting 0
ctf33 - waiting 0
ctf34 - waiting 0
ctf35 - waiting 0
ctf36 - waiting 0
ctf37 - waiting 0
ctf38 - waiting 0
ctf39 - waiting 0
ctf40 - waiting 0

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- - 0 0000 at 00:00 -
- Ubuntu 8.04 weak 1 6 December 2019 at 10:39 -
- SSRF Box 1 6 December 2019 at 10:29 -
- Metasploitable 2 1 6 December 2019 at 10:29 -
- Awky 1 6 December 2019 at 10:41 -
- SSRF Box 1 6 December 2019 at 10:03 -
- Hopital Bozobe 1 6 December 2019 at 09:55 -
- Metasploitable 2 0 6 December 2019 at 09:53 -
- Bluebox 2 - Pentest 0 6 December 2019 at 09:43 -
- SSH Agent Hijacking 1 6 December 2019 at 09:22 -