running Room 1 : Join the game

Virtual environnement to attack can be reached at : ctf01.root-me.org
Time remaining : 03:45:12

Informations

  • Virtual environnement chosen : OpenClassrooms - DVWA
  • Description : 

    This environment makes available the vulnerable web application DVWA, by the OWASP. It is offered by Root Me and OpenClassrooms as part of the OpenClassrooms course Réalisez un test d’intrusion Web.
    It allows you to carry out several tests explained during the course at your own pace in order to get to grips with the tools, the method and the results obtained: robustness of flow encryption, XSS, SQL injection, path traversal, etc.
    Once the fundamentals are mastered, you can practice on the realistic application Juice Shop, thanks to the OpenClassrooms - Juice Shop environment. Game duration : 240 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf01 OpenClassrooms - DVWA running
Time remaining : 03:45:11
1
salifou koita
ctf20 6Days Lab - v1.0.1 running
Time remaining : 00:41:37
1
root
ctf30 ARP Spoofing Man In The Middle running
Time remaining : 00:21:08
1
SpiderPingouin
ctf16 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:07:48
1
silverquent
ctf15 Relative Path Overwrite running
Time remaining : 00:19:04
1
B-Rabbit
ctf12 SamBox v1 running
Time remaining : 01:56:12
1
KaiserSauzee
ctf11 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:53:50
1
YoyoChaud
ctf10 Moth running
Time remaining : 03:23:43
1
Winty
ctf09 Windows - KerbeRoast running
Time remaining : 00:53:57
1
blackhornet
ctf08 Awky running
Time remaining : 01:23:31
1
Soft699
ctf07 AppArmorJail1 running
Time remaining : 03:54:34
1
n0l4k21
ctf06 End Droid running
Time remaining : 03:08:53
2
Crapule, at0m
ctf05 LAMP security CTF6 running
Time remaining : 01:09:34
20
X-nO, victor, ShinZhe, randomguy, JaKaDi, SorrowX, Nzoo, Zeeky, Sp00pySkelet0n, Ozne_, ilix, broken18, TiLac, Atom, Goudal3, SharK, LuciferSAY, Evan, TalsaDoom, LouisR6s
ctf04 brainpan1 running
Time remaining : 00:36:49
1
hhgregg
ctf03 ARP Spoofing EcouteActive running
Time remaining : 00:47:38
1
3C4D
ctf02 Challenge SecuriTech running
Time remaining : 01:59:22
2
ibraxx, Mica
ctf28 waiting 0
ctf29 waiting 0
ctf34 waiting 0
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf26 waiting 0
ctf27 waiting 0
ctf18 waiting 0
ctf25 waiting 0
ctf24 waiting 0
ctf23 waiting 0
ctf22 waiting 0
ctf21 waiting 0
ctf19 waiting 0
ctf17 waiting 0
ctf14 waiting 0
ctf13 waiting 0
ctf35 waiting 0

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Awky 1 4 March 2019 at 11:41 -
- Hopital Bozobe 0 4 March 2019 at 10:10 -
- /dev/random : Pipe 1 4 March 2019 at 09:51 -
- Metasploitable 1 4 March 2019 at 11:32 -
- Metasploitable 2 2 4 March 2019 at 09:07 -