Virtual environnement to attack can be reached at : ctf03.root-me.org
Time remaining : 02:13:25
Informations
- Virtual environnement chosen : SAP Pentest
- Description : Attention : this CTF-ATD is linked to the challenge "SAP Pentest 000" and "SAP Pentest 007"
The company BS-CORP decided to have an ERP to fulfils its potential.
However, they wondered whether the data are safe.
To verify this, you are mandated to perform a pentest on their new application.
Get the flag in the file /passwd to validate this CTF.
The challenges "SAP Pentest 007" and "SAP Pentest 000" on RootMe give you more goals. Game duration : 240 min - Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- Sploups21 (choice : SAP Pentest, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | Vulnix | 3 | 2 March 2019 at 21:51 | - |
- | Imagick | 1 | 3 March 2019 at 10:55 | - |
- | CsharpVulnJson | 0 | 2 March 2019 at 23:45 | - |
Ch3n4p4N | SSH Agent Hijacking | 1 | 2 March 2019 at 21:42 | 0h07 |
- | Acid: Server | 0 | 2 March 2019 at 22:38 | - |