On the 2nd of February we are holding our fifth open Attack-Defense training. We are expanding to an international arena and are going to test the brand-new infrastructure scheme to allow around 100 teams to participate.
The competition is planned to start at 11:00 UTC, and we’ll be playing for around 6 hours in total, including 30-60 minutes of closed network (although the duration can be flexible).
You can register (and find out some more details) using this Telegram bot: https://t.me/cbsctf_bot.
Competition chats are at https://t.me/cbsctf_en (international) or https://t.me/cbsctf (Russian).
Technical information:
Checksystem: https://github.com/pomo-mondreganto/ForcAD
Protocol for checksystem: https://gist.github.com/xmikasax/90a0ce5736a4274e46b9958f836951e7
Teams ips:
You can find services at /tasks on your vulnbox
Flag regex:
Scoreboard will be available on http://10.10.10.10:8080 (and http://10.10.10.10:8080/v :3) inside the ovpn network (public url will be announced later)
Flags are accepted at
Connection details:
Your team will be provided with 20 OpenVPN configs (each team member must a unique one) along with vulnbox ip address and credentials for ssh. We will send an archive with all these files right before the game with our bot (@cbsctf_bot), so be sure not to disable it.
The competition is planned to start at 11:00 UTC, and we’ll be playing for around 6 hours in total, including 30-60 minutes of closed network (although the duration can be flexible).
You can register (and find out some more details) using this Telegram bot: https://t.me/cbsctf_bot.
Competition chats are at https://t.me/cbsctf_en (international) or https://t.me/cbsctf (Russian).
Technical information:
Checksystem: https://github.com/pomo-mondreganto/ForcAD
Protocol for checksystem: https://gist.github.com/xmikasax/90a0ce5736a4274e46b9958f836951e7
Teams ips:
10.70.[0-N].2
(N is the number of teams). There also will be an NPC team (with ip `10.70.0.2`)You can find services at /tasks on your vulnbox
Flag regex:
[A-Z0-9]{31}=
Scoreboard will be available on http://10.10.10.10:8080 (and http://10.10.10.10:8080/v :3) inside the ovpn network (public url will be announced later)
Flags are accepted at
10.10.10.10:31337
and 10.10.10.10:31338
(tcp services)Connection details:
Your team will be provided with 20 OpenVPN configs (each team member must a unique one) along with vulnbox ip address and credentials for ssh. We will send an archive with all these files right before the game with our bot (@cbsctf_bot), so be sure not to disable it.
Telegram
cbsctf bot
Register to C4T BuT S4D trainings using this bot
A&D trainings (channel) pinned «On the 2nd of February we are holding our fifth open Attack-Defense training. We are expanding to an international arena and are going to test the brand-new infrastructure scheme to allow around 100 teams to participate. The competition is planned to start…»
You must have just received invite links to your team chat (if registered as solo player)
Be sure not to disable bot, we will send configs using it soon
You should have received file named team{{N}}.zip. DM me or @pomo_mondreganto if not
You need tokens for flag submission
When you connect you checksystem flag submitter, send it in the first line. After that send one flag per line to submit them
When you connect you checksystem flag submitter, send it in the first line. After that send one flag per line to submit them
A&D trainings (channel) pinned «Archive password: 254fa3268316d08bb238becef48dbfa2»
If you encounter any problems, DM @kekov or @pomo_mondreganto
Notice that
ktforces
service might be a little unstable, so the initial flag points are 3000 vs 2000 for other services