running Room 28 : Join the game

Virtual environnement to attack can be reached at : ctf28.root-me.org
Time remaining : 02:47:25

Informations

  • Virtual environnement chosen : DC-4
  • Description : 

    DC-4 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.

    Unlike the previous DC releases, this one is designed primarily for beginners/intermediates. There is only one flag, but technically, multiple entry points and just like last time, no clues.

    Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools.

    For beginners, Google can be of great assistance, but you can always tweet me at @DCAU7 for assistance to get you going again. But take note: I won’t give you the answer, instead, I’ll give you an idea about how to move forward. Game duration : 240 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf01 OpenClassrooms_SkP_Pentest_Web running
Time remaining : 03:48:12
1
Best In Gold
ctf02 Shared Objects Hijacking running
Time remaining : 01:11:55
1
noble
ctf03 Windows - KerbeRoast running
Time remaining : 00:55:06
1
Dan
ctf04 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:07:07
1
David Lemoine
ctf05 Open My Vault running
Time remaining : 03:48:46
1
mimiH16
ctf06 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:20:02
1
Florent
ctf07 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:31:38
1
Mathis Judes
ctf08 ARM FTP box running
Time remaining : 02:27:14
1
ns8
ctf09 OpenClassrooms - P7 - Analyste SOC running
Time remaining : 01:21:53
1
Olga Delmotte
ctf10 Basic pentesting 1 running
Time remaining : 01:25:16
2
lmarinaro, l4bich3
ctf11 Docker - I am groot running
Time remaining : 03:54:59
1
Neffi42
ctf12 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 01:01:10
1
Harry Lu--Leap
ctf13 Basic pentesting 1 running
Time remaining : 00:34:46
1
Skarla
ctf14 waiting 0
ctf15 End Droid running
Time remaining : 01:10:51
2
SpaceCowboy, Enokine
ctf16 OpenClassrooms - DVWA running
Time remaining : 01:12:44
5
ZOOZ, chvt, francky972, jeanpaul, MIPS32r2
ctf17 waiting 0
ctf18 BSCorp - Unix running
Time remaining : 02:11:26
1
BIEN_SUR
ctf19 waiting 0
ctf20 waiting 0
ctf21 waiting 0
ctf22 waiting 0
ctf23 waiting 0
ctf24 waiting 0
ctf25 waiting 0
ctf26 waiting 0
ctf27 waiting 0
ctf28 DC-4 running
Time remaining : 02:47:25
1
ReportSaian
ctf29 waiting 0
ctf30 waiting 0
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf34 waiting 0
ctf35 waiting 0

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Awky 1 4 March 2019 at 11:41 -
- Hopital Bozobe 0 4 March 2019 at 10:10 -
- /dev/random : Pipe 1 4 March 2019 at 09:51 -
- Metasploitable 1 4 March 2019 at 11:32 -
- Metasploitable 2 2 4 March 2019 at 09:07 -