running Room 1 : Join the game

Virtual environnement to attack can be reached at : ctf01.root-me.org
Time remaining : 02:14:10

Informations

  • Virtual environnement chosen : Texode
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "Texode"

    Texode Company is a startup of amateur developers and fan of new technologies.

    They have set up a dedicated application area accessible to everyone from the index of their site in order to simplify recruitment within their company.

    Naive as they are, they have also set up a dedicated area to creating reminders of expenses for their administrative part.. but they tell you that this part is obviously protected and inaccessible from others it’s up to you to try to learn more.

    Stand out from other candidates by showing this startup that you will manage to identify vulnerabilities in their code and then will succeed to exploit them in order to obtain root privileges on their server and get you recruited !

    The validation password of challenge (Realist) is in the /root directory. Game duration : 240 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf01 Texode running
Time remaining : 02:14:10
2
Végéta, william
ctf02 ARP Spoofing EcouteActive running
Time remaining : 00:48:25
1
akorr89
ctf03 Sambox v4 running
Time remaining : 00:14:45
1
cpt_mustard
ctf04 Shared Objects Hijacking running
Time remaining : 00:25:15
1
Aloha
ctf05 6Days Lab - v1.0.1 running
Time remaining : 03:46:54
1
Zinelabidine
ctf06 Well-Known running
Time remaining : 03:10:40
1
bigboylinx
ctf07 BBQ Factory running
Time remaining : 09:17:49
1
XMedival
ctf08 Windows - krbtgt reuse running
Time remaining : 00:07:12
1
zancrows
ctf09 /dev/random : Pipe running
Time remaining : 04:52:38
1
Youcef91
ctf10 Apprenti-Scraper running
Time remaining : 00:18:43
1
9illes
ctf11 Bee-box v1 running
Time remaining : 01:05:44
1
AndreiIsTryngToHack
ctf12 BreakingRootme2020 running
Time remaining : 00:44:35
2
sonwever, NerfMrR
ctf13 Windows XP pro 01 running
Time remaining : 00:32:22
1
Vamos
ctf14 waiting 0
ctf15 AppArmorJail1 running
Time remaining : 00:45:09
3
Croumi, Freecs, Licht
ctf16 Windows - sAMAccountName spoofing running
Time remaining : 01:14:45
1
1dl3
ctf17 End Droid running
Time remaining : 01:46:00
3
bric0, Sn1p3r, EdShot21
ctf18 Docker - I am groot running
Time remaining : 01:50:25
1
el rasho macuin
ctf19 waiting 0
ctf20 Open My Vault running
Time remaining : 01:19:13
4
Thoxym, LeDawaa, calamar62, llenaert
ctf21 Basic pentesting 1 running
Time remaining : 01:49:57
1
shi3ld4n
ctf22 waiting 0
ctf23 waiting 0
ctf24 waiting 0
ctf25 waiting 0
ctf26 waiting 0
ctf27 waiting 0
ctf28 waiting 0
ctf29 waiting 0
ctf30 waiting 0
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf34 waiting 0
ctf35 waiting 0

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Awky 1 4 March 2019 at 11:41 -
- Hopital Bozobe 0 4 March 2019 at 10:10 -
- /dev/random : Pipe 1 4 March 2019 at 09:51 -
- Metasploitable 1 4 March 2019 at 11:32 -
- Metasploitable 2 2 4 March 2019 at 09:07 -