Root Me
Inicio
Capturar la bandera
CTF todo el día
Windows - sAMAccountName spoofing
Data
23 marzo de 2023
Validaciones
195 Compromissions
26%
Nota
1
2
3
4
5
4 votos
Descripción
description_en
Tiempo de compromiso
2 horas
Sistema operativo
windows
iniciar este entorno virtual
176
Entorno virtuales
Resultados
Nombre
Validaciones
Dificuldad
↓
↑
Autor o autora
Nota
Challenge SecuriTech
1%
13
SP - Christophe
3%
3
HackDay-Albania
11%
23
Homeless
9%
13
Kuya
22%
25
Lampiao
8%
22
Lazysysadmin
16%
56
Node
20%
33
Basilic
4%
19
NullByte
26%
44
SP - Eric
30%
40
Gemini-Pentest-v2
13%
9
The Ether : EvilScience
6%
10
Typhoon-v1
33%
32
Replay 1
16%
8
Bash considered harmful
8%
138
sbrk
System Disaster
8%
137
sbrk
Shared Objects Hijacking
13%
561
das
k8s
10%
168
sambecks
DC-4
17%
156
Gittysburg
3%
2
Gemini-Pentest-v1
7%
29
DC-7
27%
48
Billu-b0x2
10%
123
JIS-CTF-VulnUpload-CTF01
24%
30
Kevgir-VM
17%
31
lin.security_v1.0
42%
86
Moonraker
11%
8
OwlNest v1.0.2
10%
4
Raven 2
13%
10
Sambox v4
3%
104
sambecks
Django unchained
22%
610
TiWim
Billu-b0x
8%
34
g0rmint
8%
11
BlackMarket
11%
67
Born2rootv2
34%
92
Bee-box v1
6%
41
Command Injection OS
18%
56
DC-1
15%
344
digitalworld.local - BRAVERY
11%
17
digitalworld.local - DEVELOPMENT
9%
12
DonkeyDocker v1
23%
16
DC-6
30%
112
DC-9
32%
106
DeRPnStiNK
29%
41
OpenClassrooms_SkP_Pentest_Web
0%
0
Matrix terminal
6%
51
Open My Vault
0%
0
Windows - sAMAccountName spoofing
26%
195
OpenClassrooms_SkillProgram_AD1
1%
61
Pixis
,
EtienneC
0
50
100
150