Virtual environnement to attack can be reached at : ctf04.root-me.org
Time remaining : 03:26:35
Informations
- Virtual environnement chosen : OpenClassrooms - DVWA
- Description :
This environment makes available the vulnerable web application DVWA, by the OWASP. It is offered by Root Me and OpenClassrooms as part of the OpenClassrooms course Réalisez un test d’intrusion Web.
It allows you to carry out several tests explained during the course at your own pace in order to get to grips with the tools, the method and the results obtained: robustness of flow encryption, XSS, SQL injection, path traversal, etc.
Once the fundamentals are mastered, you can practice on the realistic application Juice Shop, thanks to the OpenClassrooms - Juice Shop environment. Game duration : 240 min - Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- Denis Pierrot (choice : OpenClassrooms - DVWA, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | SamBox v3 | 1 | 2 March 2019 at 23:16 | - |
- | Awky | 1 | 2 March 2019 at 23:09 | - |
- | SSRF Box | 2 | 2 March 2019 at 23:30 | - |
- | Mr. Robot 1 | 1 | 3 March 2019 at 13:56 | - |
- | SSH Agent Hijacking | 1 | 2 March 2019 at 22:45 | - |