Virtual environnement to attack can be reached at : ctf14.root-me.org
Time remaining : 03:10:59
Informations
- Virtual environnement chosen : BSCorp - Unix
- Description : Attention : this CTF-ATD is linked to the challenge "Highway to shell"
After being hacked several times on their windows infrastructures, BS Corp decides to create his own SOC.
The team worked to migrate some services under linux environement.Show them that it is not enough !
- Highway to shell challenge flag is located in /root folder
- CTF AD password is located in /passwd file Game duration : 240 min
- Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- robin (choice : BSCorp - Unix, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | SSH Agent Hijacking | 1 | 3 March 2019 at 00:13 | - |
- | SAP Pentest | 1 | 2 March 2019 at 23:57 | - |
- | Mr. Robot 1 | 0 | 3 March 2019 at 01:34 | - |
shark729 | SSH Agent Hijacking | 2 | 2 March 2019 at 23:55 | 0h11 |
- | SSH Agent Hijacking | 1 | 3 March 2019 at 13:54 | - |