Virtual environnement to attack can be reached at : ctf02.root-me.org
Time remaining : 02:35:20
Informations
- Virtual environnement chosen : OpenClassrooms - DVWA
- Description :
This environment makes available the vulnerable web application DVWA, by the OWASP. It is offered by Root Me and OpenClassrooms as part of the OpenClassrooms course Réalisez un test d’intrusion Web.
It allows you to carry out several tests explained during the course at your own pace in order to get to grips with the tools, the method and the results obtained: robustness of flow encryption, XSS, SQL injection, path traversal, etc.
Once the fundamentals are mastered, you can practice on the realistic application Juice Shop, thanks to the OpenClassrooms - Juice Shop environment. Game duration : 240 min - Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- ultron_10 (choice : OpenClassrooms - DVWA, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | Mr. Robot 1 | 1 | 26 February 2019 at 19:53 | - |
- | SSRF Box | 3 | 26 February 2019 at 19:38 | - |
- | SamBox v1 | 1 | 26 February 2019 at 20:09 | - |
- | Metasploitable | 2 | 26 February 2019 at 21:00 | - |
ROBIL | LAMP security CTF5 | 3 | 26 February 2019 at 18:46 | 1h51 |