Virtual environnement to attack can be reached at : ctf28.root-me.org
Time remaining : 02:47:25
Informations
- Virtual environnement chosen : DC-4
- Description :
DC-4 is another purposely built vulnerable lab with the intent of gaining experience in the world of penetration testing.
Unlike the previous DC releases, this one is designed primarily for beginners/intermediates. There is only one flag, but technically, multiple entry points and just like last time, no clues.
Linux skills and familiarity with the Linux command line are a must, as is some experience with basic penetration testing tools.
For beginners, Google can be of great assistance, but you can always tweet me at @DCAU7 for assistance to get you going again. But take note: I won’t give you the answer, instead, I’ll give you an idea about how to move forward. Game duration : 240 min
- Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- ReportSaian (choice : DC-4, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | Awky | 1 | 4 March 2019 at 11:41 | - |
- | Hopital Bozobe | 0 | 4 March 2019 at 10:10 | - |
- | /dev/random : Pipe | 1 | 4 March 2019 at 09:51 | - |
- | Metasploitable | 1 | 4 March 2019 at 11:32 | - |
- | Metasploitable 2 | 2 | 4 March 2019 at 09:07 | - |