running Room 13 : Join the game

Virtual environnement to attack can be reached at : ctf13.root-me.org
Time remaining : 01:20:06

Informations

  • Virtual environnement chosen : Texode
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "Texode"

    Texode Company is a startup of amateur developers and fan of new technologies.

    They have set up a dedicated application area accessible to everyone from the index of their site in order to simplify recruitment within their company.

    Naive as they are, they have also set up a dedicated area to creating reminders of expenses for their administrative part.. but they tell you that this part is obviously protected and inaccessible from others it’s up to you to try to learn more.

    Stand out from other candidates by showing this startup that you will manage to identify vulnerabilities in their code and then will succeed to exploit them in order to obtain root privileges on their server and get you recruited !

    The validation password of challenge (Realist) is in the /root directory. Game duration : 240 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf35 waiting 0
ctf09 waiting 0
ctf25 waiting 0
ctf27 waiting 0
ctf28 waiting 0
ctf21 waiting 0
ctf29 waiting 0
ctf30 waiting 0
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf34 waiting 0
ctf08 Apprenti-Scraper stopping 2
tbmc, Tsmo
ctf02 LAMP security CTF5 starting 1
Li_iN
ctf26 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:30:17
1
Florent Caux
ctf24 Windows - sAMAccountName spoofing running
Time remaining : 00:45:31
1
highlander
ctf23 Hopital Bozobe running
Time remaining : 03:09:33
1
Usern4me
ctf22 Windows - ASRepRoast running
Time remaining : 01:06:44
1
Gringo
ctf01 A bittersweet shellfony running
Time remaining : 01:43:27
1
test momo
ctf20 Metasploitable 2 running
Time remaining : 00:00:13
1
ibou djiallo
ctf19 OpenClassrooms - DVWA running
Time remaining : 02:47:07
3
Clovis, SnowS9, K0pan
ctf17 Windows - sAMAccountName spoofing running
Time remaining : 00:45:00
1
frantz45
ctf16 LAMP security CTF7 running
Time remaining : 02:59:43
2
Zaaky, 930turbo
ctf15 Django unchained running
Time remaining : 02:35:32
2
Al-oxos, AndreiIsTryngToHack
ctf14 End Droid running
Time remaining : 01:35:42
1
gr1mgh0ul
ctf13 Texode running
Time remaining : 01:20:05
1
Silfur
ctf12 System Disaster running
Time remaining : 01:39:51
1
Bunoud
ctf11 ARM FTP box running
Time remaining : 00:04:14
1
cezame
ctf10 ARP Spoofing EcouteActive running
Time remaining : 00:34:34
1
geronimo-ooo
ctf07 Windows - krbtgt reuse running
Time remaining : 00:36:26
1
zancrows
ctf06 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:29:14
1
Laetitia Leguen
ctf05 OpenClassrooms - Sécurité Active Directory running
Time remaining : 02:38:04
2
Jeroxe, root4HK
ctf04 Windows - KerbeRoast running
Time remaining : 00:50:50
1
Ognon
ctf03 Sambox v4 running
Time remaining : 02:18:06
1
Руслан
ctf18 Websocket - 0 protection running
Time remaining : 01:45:42
1
kr4t0s82_4n6s

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Awky 1 4 March 2019 at 11:41 -
- Hopital Bozobe 0 4 March 2019 at 10:10 -
- /dev/random : Pipe 1 4 March 2019 at 09:51 -
- Metasploitable 1 4 March 2019 at 11:32 -
- Metasploitable 2 2 4 March 2019 at 09:07 -