Sambox v4
Description
You are mandated to conduct a redteam assessment of a company. From the company’s parking garage you managed to capture Wi-Fi traffic, but alas it’s proven impossible to crack the WPA key. The next logical step is to attack the company through the internet.
Your objective is to obtain total control of all servers so that you may collect individual flags for each of them.
The flag to validate is made as following "flag server1 content+flag server2 content+flag server3 content+flag server4 content" without the "+".
The CTFATD validation file « passwd » is in the directory « C :\Documents and Settings\Administrator> ».
Note :
The downloadable archive is to be decrypted using the contents of the "2nd-part-flag.txt" as a password. By using this archive you should then be able to understand the joined PCAP file.
Download the files before launching the CTF :
- Archive : http://challenge01.root-me.org/realiste/ch20/clusir-w7.zip
- PCAP : http://challenge01.root-me.org/realiste/ch20/clusir8-01.cap
Also, don’t forget that :
- this CTF has several machines to pwn
- only one of those is connected to the internet
Temps de compromission
4 heures
Système d'exploitation
windows
démarrer cet environnement virtuelRésultats du CTF alltheday pour Sambox v4
Pseudonyme | Environnement Virtuel | Nombre d'attaquant | Date de début | Environnement compromis en |
- | Sambox v4 | 1 | 2019年2月18日 to 18:20 | - |
- | Sambox v4 | 0 | 2019年2月14日 to 13:46 | - |
- | Sambox v4 | 1 | 2019年2月12日 to 14:07 | - |
- | Sambox v4 | 1 | 2019年2月12日 to 09:36 | - |
- | Sambox v4 | 0 | 2019年2月6日 to 12:34 | - |