running Room 5 : Join the game

Virtual environnement to attack can be reached at : ctf05.root-me.org
Time remaining : 03:11:18

Informations

  • Virtual environnement chosen : AppArmorJail1
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "AppArmor Jail - Introduction"

    When connecting to the administrator’s server, a restricted shell via an AppArmor policy prevents you from reading the flag even though you are the owner...

    Find a way to read the flag at any cost and override the AppArmor policy in place which is configured as follows:

    #include <tunables/global>

    profile docker_chall01 flags=(attach_disconnected,mediate_deleted) {
       #include <abstractions/base>
       network,
       capability,
       file,
       umount,
       signal (send,receive),
       deny mount,

       deny /sys/[^f]*/** wklx,
       deny /sys/f[^s]*/** wklx,
       deny /sys/fs/[^c]*/** wklx,
       deny /sys/fs/c[^g]*/** wklx,
       deny /sys/fs/cg[^r]*/** wklx,
       deny /sys/firmware/** rwklx,
       deny /sys/kernel/security/** rwklx,

       deny @{PROC}/* w,   # deny write for all files directly in /proc (not in a subdir)
       # deny write to files not in /proc/<number>/** or /proc/sys/**
       deny @{PROC}/{[^1-9],[^1-9][^0-9],[^1-9s][^0-9y][^0-9s],[^1-9][^0-9][^0-9][^0-9]*}/** w,
       deny @{PROC}/sys/[^k]** w,  # deny /proc/sys except /proc/sys/k* (effectively /proc/sys/kernel)
       deny @{PROC}/sys/kernel/{?,??,[^s][^h][^m]**} w,  # deny everything except shm* in /proc/sys/kernel/
       deny @{PROC}/sysrq-trigger rwklx,
       deny @{PROC}/kcore rwklx,

       /home/app-script-ch27/bash px -> bashprof1,
     
    }
    profile bashprof1 flags=(attach_disconnected,mediate_deleted) {
       #include <abstractions/base>
       #include <abstractions/bash>
       
       network,
       capability,
       deny mount,
       umount,
       signal (send,receive),

       deny /sys/[^f]*/** wklx,
       deny /sys/f[^s]*/** wklx,
       deny /sys/fs/[^c]*/** wklx,
       deny /sys/fs/c[^g]*/** wklx,
       deny /sys/fs/cg[^r]*/** wklx,
       deny /sys/firmware/** rwklx,
       deny /sys/kernel/security/** rwklx,

       deny @{PROC}/* w,   # deny write for all files directly in /proc (not in a subdir)
       # deny write to files not in /proc/<number>/** or /proc/sys/**
       deny @{PROC}/{[^1-9],[^1-9][^0-9],[^1-9s][^0-9y][^0-9s],[^1-9][^0-9][^0-9][^0-9]*}/** w,
       deny @{PROC}/sys/[^k]** w,  # deny /proc/sys except /proc/sys/k* (effectively /proc/sys/kernel)
       deny @{PROC}/sys/kernel/{?,??,[^s][^h][^m]**} w,  # deny everything except shm* in /proc/sys/kernel/
       deny @{PROC}/sysrq-trigger rwklx,
       deny @{PROC}/kcore rwklx,

       / r,
       /** mrwlk,
       /bin/** ix,
       /usr/bin/** ix,
       /lib/x86_64-linux-gnu/ld-*.so mrUx,
       deny /home/app-script-ch27/flag.txt r,
    }
    • Start the CTF-ATD "AppArmorJail1"
    • Connect via SSH to the machine on port 22222 (app-script-ch27:app-script-ch27)
    • The challenge validation password is in the /home/app-script-ch27/flag.txt file
    • The validation password of the CTF ATD is in the file /passwd

    Start the challenge Game duration : 240 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf35 waiting 0
ctf12 waiting 0
ctf22 waiting 0
ctf20 waiting 0
ctf17 waiting 0
ctf16 waiting 0
ctf28 waiting 0
ctf14 waiting 0
ctf25 waiting 0
ctf13 waiting 0
ctf29 waiting 0
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf34 waiting 0
ctf24 waiting 0
ctf21 LAMP security CTF5 running
Time remaining : 00:01:12
1
b4n3
ctf10 Metasploitable 2 running
Time remaining : 00:51:24
1
Mando
ctf30 Metasploitable 2 running
Time remaining : 00:28:41
1
blackr3se
ctf03 SamBox v2 running
Time remaining : 00:24:14
1
Hacktimel
ctf23 BBQ Factory running
Time remaining : 05:05:30
1
siqox
ctf27 DC-1 running
Time remaining : 00:11:02
1
xpolarized
ctf26 The Ether : EvilScience starting 1
Usurper
ctf11 Shared Objects Hijacking running
Time remaining : 01:36:12
1
Incinscible
ctf01 Well-Known running
Time remaining : 03:28:27
2
capy, mire
ctf04 BreakingRootme2020 running
Time remaining : 01:00:26
2
sonwever, NerfMrR
ctf07 Nodeful running
Time remaining : 00:31:35
1
Nurgalym Jambul
ctf19 Docker - Talk through me running
Time remaining : 02:39:09
1
Neriss
ctf02 OpenClassrooms - Juice Shop running
Time remaining : 03:09:29
1
unknown
ctf06 Windows - ASRepRoast running
Time remaining : 01:13:04
2
yep, heirim12
ctf15 Apprenti-Scraper running
Time remaining : 01:53:19
2
val, raaphael273
ctf18 Windows - sAMAccountName spoofing running
Time remaining : 00:38:09
1
0xSpectra
ctf08 Windows - KerbeRoast running
Time remaining : 01:32:52
1
Gringo
ctf05 AppArmorJail1 running
Time remaining : 03:11:18
1
Dexiios
ctf09 End Droid running
Time remaining : 01:32:35
3
Bigyls, goorst, Kamila

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Mr. Robot 1 1 3 March 2019 at 11:17 -
- Acid: Reloaded 0 2 March 2019 at 22:42 -
- Rootkit Cold Case 0 2 March 2019 at 23:55 -
- Vulnix 0 2 March 2019 at 22:16 -
- Awky 1 3 March 2019 at 13:36 -