Virtual environnement to attack can be reached at : ctf13.root-me.org
Time remaining : 01:02:24
Informations
- Virtual environnement chosen : OpenClassrooms - DVWA
- Description :
This environment makes available the vulnerable web application DVWA, by the OWASP. It is offered by Root Me and OpenClassrooms as part of the OpenClassrooms course Réalisez un test d’intrusion Web.
It allows you to carry out several tests explained during the course at your own pace in order to get to grips with the tools, the method and the results obtained: robustness of flow encryption, XSS, SQL injection, path traversal, etc.
Once the fundamentals are mastered, you can practice on the realistic application Juice Shop, thanks to the OpenClassrooms - Juice Shop environment. Game duration : 240 min - Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- Patik_oc (choice : OpenClassrooms - DVWA, ready)
- ZOOZ (choice : OpenClassrooms - DVWA, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | Awky | 1 | 4 March 2019 at 11:41 | - |
- | Hopital Bozobe | 0 | 4 March 2019 at 10:10 | - |
- | /dev/random : Pipe | 1 | 4 March 2019 at 09:51 | - |
- | Metasploitable | 1 | 4 March 2019 at 11:32 | - |
- | Metasploitable 2 | 2 | 4 March 2019 at 09:07 | - |