Virtual environnement to attack can be reached at : ctf04.root-me.org
Time remaining : 03:54:47
Informations
- Virtual environnement chosen : Bluebox - Microsoft Pentest
- Description : Attention : this CTF-ATD is linked to the challenge "Bluebox - Pentest"
Pentest Microsoft environment starting from a webservice on the Internet until the total compromise of the Active Directory domain of the company.
Final goal: get an access to the web application http://srvstaff.bs.corp under the identity of Emmanuel Goldstein (CEO). Game duration : 240 min
- Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- Elsharion (choice : Bluebox - Microsoft Pentest, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | SSH Agent Hijacking | 1 | 3 March 2019 at 00:13 | - |
- | SAP Pentest | 1 | 2 March 2019 at 23:57 | - |
- | Mr. Robot 1 | 0 | 3 March 2019 at 01:34 | - |
shark729 | SSH Agent Hijacking | 2 | 2 March 2019 at 23:55 | 0h11 |
- | SSH Agent Hijacking | 1 | 3 March 2019 at 13:54 | - |