configuring Room 3 : Join the game

Virtual environnement is booting, please be patient :)

Informations

  • Virtual environnement chosen : Sambox v4
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "SamBox v4"

    You are mandated to conduct a redteam assessment of a company. From the company’s parking garage you managed to capture Wi-Fi traffic, but alas it’s proven impossible to crack the WPA key. The next logical step is to attack the company through the internet.

    Your objective is to obtain total control of all servers so that you may collect individual flags for each of them.

    The flag to validate is made as following "flag server1 content+flag server2 content+flag server3 content+flag server4 content" without the "+".

    The CTFATD validation file « passwd » is in the directory « C :\Documents and Settings\Administrator> ».

    Note :
    The downloadable archive is to be decrypted using the contents of the "2nd-part-flag.txt" as a password. By using this archive you should then be able to understand the joined PCAP file.

    Download the files before launching the CTF :

    Also, don’t forget that :

    • this CTF has several machines to pwn
    • only one of those is connected to the internet Game duration : 240 min
  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf35 waiting 0
ctf19 waiting 0
ctf34 waiting 0
ctf33 waiting 0
ctf32 waiting 0
ctf31 waiting 0
ctf29 waiting 0
ctf28 waiting 0
ctf27 waiting 0
ctf26 waiting 0
ctf24 waiting 0
ctf23 waiting 0
ctf22 waiting 0
ctf21 waiting 0
ctf20 waiting 0
ctf18 waiting 0
ctf17 waiting 0
ctf13 waiting 0
ctf12 waiting 0
ctf10 waiting 0
ctf15 waiting 0
ctf16 waiting 0
ctf14 Docker - Talk through me running
Time remaining : 00:03:54
1
Weac
ctf11 ARP Spoofing EcouteActive running
Time remaining : 00:35:11
1
at0m
ctf25 End Droid running
Time remaining : 00:43:50
1
JeanC@T
ctf02 SSRF Box running
Time remaining : 02:11:16
1
ho1ow
ctf09 Relative Path Overwrite running
Time remaining : 01:48:44
1
Gusty
ctf08 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:22:14
1
Laetitia Leguen
ctf30 C for C-cure running
Time remaining : 01:57:45
1
Elweth
ctf05 BBQ Factory running
Time remaining : 03:10:14
1
XMedival
ctf04 Shared Objects Hijacking starting 1
0xFFFFFFFFFF
ctf03 Sambox v4 configuring 1
cpt_mustard
ctf01 Texode running
Time remaining : 01:56:14
1
hacktivist
ctf07 Docker - Sys-Admin’s Docker running
Time remaining : 02:58:17
2
Id3m, Lorenz
ctf06 OpenClassrooms - DVWA running
Time remaining : 02:52:56
3
ultron_10, mae, Denis Pierrot

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Awky 1 4 March 2019 at 11:41 -
- Hopital Bozobe 0 4 March 2019 at 10:10 -
- /dev/random : Pipe 1 4 March 2019 at 09:51 -
- Metasploitable 1 4 March 2019 at 11:32 -
- Metasploitable 2 2 4 March 2019 at 09:07 -