Root Me
Inicio
Capturar la bandera
CTF todo el día
Windows - sAMAccountName spoofing
Data
23 marzo de 2023
Validaciones
195 Compromissions
26%
Nota
1
2
3
4
5
4 votos
Descripción
description_en
Tiempo de compromiso
2 horas
Sistema operativo
windows
iniciar este entorno virtual
176
Entorno virtuales
Resultados
Nombre
↓
↑
Validaciones
Dificuldad
Autor o autora
Nota
/dev/random : Pipe
5%
236
/dev/random : Relativity
7%
97
/dev/random : Sleepy
4%
44
3mrgnc3 - 64Base
10%
52
3mrgnc3 - D0Not5top v1.2
17%
18
6Days Lab - v1.0.1
12%
38
A bittersweet shellfony
12%
233
mayfly
ARM FTP box
5%
73
chaignc
ARP Spoofing EcouteActive
0%
0
voydstack
Acid: Reloaded
18%
176
Acid: Server
12%
218
Analougepond
13%
48
AppArmorJail1
0%
0
nivram
AppArmorJail2
0%
0
Apprenti-Scraper
0%
1
Awky
8%
495
sbrk
BBQ Factory
6%
125
sm0k
,
dvor4x
BLACKLIGHT
8%
40
BSCorp - Unix
5%
200
ghozt
,
mayfly
BSides-Vancouver-2018-Workshop
27%
47
Bash considered harmful
8%
138
sbrk
Basic pentesting 1
32%
4662
Basilic
4%
19
Bee-box v1
6%
41
Billu-b0x
8%
34
Billu-b0x2
10%
123
BlackMarket
11%
67
Bluebox - Microsoft Pentest
4%
418
Bluebox 2 - Pentest
3%
306
sambecks
Bob v1.0.1
26%
86
Born2Root
9%
169
Born2rootv2
34%
92
BreakingRootme2020
15%
512
Laluka
Bulldog
27%
195
Bulldog2
13%
31
C for C-cure
5%
12
nikost
CH4INRULZ v1.0.1
15%
29
CTFair
0%
0
Challenge SecuriTech
1%
13
Command Injection OS
18%
56
Covfefe
35%
52
CsharpVulnJson
6%
14
notfound404
CsharpVulnSoap
9%
8
DC-1
15%
344
DC-4
17%
156
DC-6
30%
112
DC-7
27%
48
DC-9
32%
106
DC416 - Baffle
0%
0
DC416 - Basement
0%
0
0
50
100
150