Sambox v4

Date

Validations

98 Compromissions 3%

Note  Notation

6 Votes

Description

Attention : this CTF-ATD is linked to the challenge "SamBox v4"

You are mandated to conduct a redteam assessment of a company. From the company’s parking garage you managed to capture Wi-Fi traffic, but alas it’s proven impossible to crack the WPA key. The next logical step is to attack the company through the internet.

Your objective is to obtain total control of all servers so that you may collect individual flags for each of them.

The flag to validate is made as following "flag server1 content+flag server2 content+flag server3 content+flag server4 content" without the "+".

The CTFATD validation file « passwd » is in the directory « C :\Documents and Settings\Administrator> ».

Note :
The downloadable archive is to be decrypted using the contents of the "2nd-part-flag.txt" as a password. By using this archive you should then be able to understand the joined PCAP file.

Download the files before launching the CTF :

Also, don’t forget that :

  • this CTF has several machines to pwn
  • only one of those is connected to the internet

Compromission time

4 hours

Operating system

 windows

start this virtual environnement

CTF Results CTF Results for Sambox v4

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Sambox v4 1 18 February 2019 at 18:20 -
- Sambox v4 0 14 February 2019 at 13:46 -
- Sambox v4 1 12 February 2019 at 14:07 -
- Sambox v4 1 12 February 2019 at 09:36 -
- Sambox v4 0 6 February 2019 at 12:34 -

 173 Virtual Environnements

Results Name Validations Difficulty  Difficulty Author Note  Notation
pas_valide Metasploitable 2 40% 8346
pas_valide Basic pentesting 1 32% 4417
pas_valide LAMP security CTF5 26% 3827
pas_valide LAMP security CTF4 35% 2687
pas_valide Docker - I am groot 51% 2619 Ech0
pas_valide SSH Agent Hijacking 26% 2258 mayfly
pas_valide Metasploitable 12% 1698
pas_valide SSRF Box 18% 1672 sambecks
pas_valide Mr. Robot 1 22% 1625
pas_valide Imagick 22% 997 sambecks
pas_valide Kioptrix level 2 25% 962
pas_valide SamBox v2 13% 951 sambecks
pas_valide End Droid 36% 915
pas_valide LAMP security CTF7 39% 879
pas_valide Docker - Sys-Admin’s Docker 41% 834 Ech0
pas_valide VulnVoIP 17% 826
pas_valide SamBox v1 7% 714 sambecks
pas_valide LAMP security CTF6 18% 599
pas_valide Django unchained 22% 578 TiWim
pas_valide Well-Known 10% 574 sm0k
pas_valide Kioptrix level 3 33% 569
pas_valide Docker - Talk through me 43% 561 Ech0
pas_valide Shared Objects Hijacking 13% 519 das
pas_valide Windows XP pro 01 5% 490 g0uZ
pas_valide Awky 8% 483 sbrk
pas_valide BreakingRootme2020 15% 477 Laluka
pas_valide Windows - Group Policy Preferences Passwords 23% 472
pas_valide Kioptrix level 4 35% 459
pas_valide Rootkit Cold Case 16% 443 franb
pas_valide Bluebox - Microsoft Pentest 4% 408
pas_valide pWnOS 32% 394
pas_valide Websocket - 0 protection 6% 379 Worty
pas_valide Hackademic RTB1 19% 363
pas_valide DC-1 15% 333
pas_valide SamBox v3 5% 327 sambecks
pas_valide Windows - KerbeRoast 20% 305
pas_valide Exploit KB Vulnerable Web App 12% 305
pas_valide Bluebox 2 - Pentest 3% 300 sambecks
pas_valide Holynix v1 24% 292
pas_valide LAMP security CTF8 14% 288
pas_valide SAP Pentest 7% 284 iggy
pas_valide Windows - ASRepRoast 36% 270
pas_valide /dev/random : Pipe 5% 233
pas_valide LordoftheRoot 25% 227
pas_valide Hopital Bozobe 8% 223 sambecks
pas_valide A bittersweet shellfony 12% 216 mayfly
pas_valide FristiLeaks 1.3 29% 214
pas_valide Acid: Server 12% 212
pas_valide SkyTower 24% 212
pas_valide Ubuntu 8.04 weak 5% 205 g0uZ