running Room 13 : Join the game

Virtual environnement to attack can be reached at : ctf13.root-me.org
Time remaining : 00:01:20

Informations

  • Virtual environnement chosen : Sambox v4
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "SamBox v4"

    You are mandated to conduct a redteam assessment of a company. From the company’s parking garage you managed to capture Wi-Fi traffic, but alas it’s proven impossible to crack the WPA key. The next logical step is to attack the company through the internet.

    Your objective is to obtain total control of all servers so that you may collect individual flags for each of them.

    The flag to validate is made as following "flag server1 content+flag server2 content+flag server3 content+flag server4 content" without the "+".

    The CTFATD validation file « passwd » is in the directory « C :\Documents and Settings\Administrator> ».

    Note :
    The downloadable archive is to be decrypted using the contents of the "2nd-part-flag.txt" as a password. By using this archive you should then be able to understand the joined PCAP file.

    Download the files before launching the CTF :

    Also, don’t forget that :

    • this CTF has several machines to pwn
    • only one of those is connected to the internet Game duration : 240 min
  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf01 Bluebox 2 - Pentest running
Time remaining : 02:00:42
2
Wiifou, Le_Pid@dk
ctf02 OpenClassrooms - P7 - Analyste SOC running
Time remaining : 03:30:26
1
Lucas Plancke
ctf03 Relative Path Overwrite running
Time remaining : 01:34:27
1
mxcezl
ctf04 SSH Agent Hijacking running
Time remaining : 00:23:08
1
ZaiiKo
ctf05 AppArmorJail2 running
Time remaining : 02:26:58
1
clomic
ctf06 waiting 0
ctf07 OpenClassrooms - DVWA running
Time remaining : 01:20:56
2
zesrow, herve972
ctf08 Rootkit Cold Case running
Time remaining : 00:25:27
1
Konnex
ctf09 OpenClassrooms - Juice Shop running
Time remaining : 01:27:14
1
Julesdlm
ctf10 OpenClassrooms - Sécurité Active Directory running
Time remaining : 02:35:25
1
lpoirier
ctf11 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:05:45
1
Laetitia Leguen
ctf12 AppArmorJail1 running
Time remaining : 02:51:50
2
CDA1968, Skyrex
ctf13 Sambox v4 running
Time remaining : 00:01:20
1
SeysTamsha
ctf14 waiting 0
ctf15 k8s running
Time remaining : 02:59:57
2
Herel, Sarapuce
ctf16 waiting 0
ctf17 SSRF Box running
Time remaining : 01:06:41
1
G0AT
ctf18 waiting 0
ctf19 waiting 1
Fyxneo
ctf20 waiting 1
Zishan Ahamed Thandar
ctf21 waiting 1
Arcghar
ctf22 waiting 1
Nefbou123
ctf23 waiting 1
dalifit
ctf24 waiting 1
Cyrhades
ctf25 waiting 1
Juli4-Tr4ining
ctf26 waiting 1
Globule
ctf27 waiting 0
ctf28 waiting 0
ctf29 waiting 0
ctf30 C for C-cure running
Time remaining : 02:53:02
1
cezame
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf34 waiting 0
ctf35 waiting 0

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- SSH Agent Hijacking 1 3 March 2019 at 00:13 -
- SAP Pentest 1 2 March 2019 at 23:57 -
- Mr. Robot 1 0 3 March 2019 at 01:34 -
shark729 SSH Agent Hijacking 2 2 March 2019 at 23:55 0h11
- SSH Agent Hijacking 1 3 March 2019 at 13:54 -