Virtual environnement to attack can be reached at : ctf10.root-me.org
Time remaining : 00:09:21
Informations
- Virtual environnement chosen : Basic pentesting 1
- Description :
This is a small boot2root VM I created for my university’s cyber security group. It contains multiple remote vulnerabilities and multiple privilege escalation vectors. I did all of my testing for this VM on VirtualBox, so that’s the recommended platform. I have been informed that it also works with VMware, but I haven’t tested this personally.
This VM is specifically intended for newcomers to penetration testing. If you’re a beginner, you should hopefully find the difficulty of the VM to be just right.
Your goal is to remotely attack the VM and gain root privileges. Once you’ve finished, try to find other vectors you might have missed! Game duration : 120 min
- Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- l4bich3 (choice : Basic pentesting 1, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | Awky | 1 | 4 March 2019 at 11:41 | - |
- | Hopital Bozobe | 0 | 4 March 2019 at 10:10 | - |
- | /dev/random : Pipe | 1 | 4 March 2019 at 09:51 | - |
- | Metasploitable | 1 | 4 March 2019 at 11:32 | - |
- | Metasploitable 2 | 2 | 4 March 2019 at 09:07 | - |