Virtual environnement to attack can be reached at : ctf22.root-me.org
Time remaining : 00:18:32
Informations
- Virtual environnement chosen : SAP Pentest
- Description : Attention : this CTF-ATD is linked to the challenge "SAP Pentest 000" and "SAP Pentest 007"
The company BS-CORP decided to have an ERP to fulfils its potential.
However, they wondered whether the data are safe.
To verify this, you are mandated to perform a pentest on their new application.
Get the flag in the file /passwd to validate this CTF.
The challenges "SAP Pentest 007" and "SAP Pentest 000" on RootMe give you more goals. Game duration : 240 min - Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- hackoys (choice : SAP Pentest, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | Awky | 3 | 3 March 2019 at 21:28 | - |
- | Mr. Robot 1 | 1 | 3 March 2019 at 20:59 | - |
- | LordoftheRoot | 0 | 3 March 2019 at 20:56 | - |
- | Metasploitable | 1 | 4 March 2019 at 08:03 | - |
RadekG | SSH Agent Hijacking | 1 | 3 March 2019 at 20:57 | 0h12 |