A&D trainings (channel)
373 subscribers
13 photos
2 files
31 links
A&D trainings by C4T BuT S4D (channel)
Download Telegram
Congratulations to team one-liner__pl on service overheard firstblood!
Flag receiver will restart now, so active connections could break.
6 minutes left. It’s time to hack this node js little boy!
180+-2 round will be the last one!
GG!
The infra will be up & running for 30 more minutes, so you can save everything you need. After that, everything will be destroyed.
Congratulations to our winners!

I ) LEGOFAN
II ) Teilzeit-Schwenker
III) ftooh
We will be glad if you submit this feedback form https://forms.gle/vAnWM6gU2i8uF2pA6 so we can do better next time!
As always there is information for those who want to support us:

We organize our CTFs and trainings on a regular basis. Though our infrastructure is cost-optimized, it is not 0. So we are open for donations if you want to support us. Vulnbox costs ~3$ per team.

Paypal: https://www.paypal.me/pomomondreganto
Tinkoff (roubles or if you have a multi wallet card): https://www.tinkoff.ru/sl/3JBSc9Kgiy0
DStream: https://donate.stream/cbsctf
Bitcoin: 1F6XjKjCMvHseScedHyH2xFpLybFGAfgZP

Next training will be in classic format (not blitz). We hope to see you there!
🔥🌚🔥
On the 18th of October we are holding our second RundergroundCTF!

DATE

The competition is planned to start at 11:00 UTC, and we’ll be playing for around 6 hours in total, including 1 hour of closed network.

No more than 20 people are allowed to be in a single team.

REGISTER

You can register here: https://register.cbsctf.live/

CHATS

Competition chats are at @cbsctf_en (international) or @cbsctf (Russian).
Competition channel is at @cbsctf_c. Here you will find all game notifications and necessary info.

VPN

Be aware that we are using Wireguard, not OpenVPN. Simple how-to:

1. Install wireguard, instructions can be found here: https://www.wireguard.com/install/.

2. You’ll be given the config file (teamN_M.conf). All former constraints are applicable as well, so each configuration file can be used by one teammate only. To connect, run

wg-quick up <file>

on linux in terminal, or import the file into the native app on macOS or Windows. macOS also has wireguard-tools package with wg-quick command in Homebrew.

3. To disconnect, run

wg-quick down <file>

TIMELINE

Game timeline:

— 10:30 password-protected configs arhive and services arhive are loaded to the server, so you can download them on https://register.cbsctf.live.
— 11:00 password is posted in the channel and sent via bot.
— 12:00 game network opens and the game officially begins.
— 17:00 the game ends.

CHECKSYSTEM

Checksystem:

https://github.com/pomo-mondreganto/ForcAD

What tokens are for:

After you've connected to the flag submission system, you must type your team token in the first line, followed by flags (one per line).

Simple script for flag submission:
https://gist.github.com/pomo-mondreganto/a864e3a259045846dee1fa0cb9fa68ea
Protocol for checksystem (for Destructive Farm):
https://github.com/DestructiveVoice/DestructiveFarm/blob/master/server/protocols/forcad_tcp.py

NETWORK

Teams ips: 10.80.[0-N].2 (N is the number of teams).
There also will be an NPC team (with ip 10.80.0.2 )
Flag regex: [A-Z0-9]{31}=
Scoreboard will be available on http://10.10.10.10 inside the wireguard network and on http://cbsctf.live in global network.
Flags are accepted at 10.10.10.10:31337 (tcp service)

POINTS AND SERVICES

Actual formula of service points change can be found here:

https://github.com/pomo-mondreganto/ForcAD/blob/master/backend/scripts/create_functions.sql#L41

Service statuses:

- OK: service works perfectly
- DOWN: service is inaccessible
- CORRUPT: checker can't get one of the old flags
- CHECK FAILED: organizers mistake, oops
- MUMBLE: everything else

IMPORTANT
There will also be checksystem api route to help you during the game. It will be accessible on http://10.10.10.10/api/attack_data during the game and will contains JSON data of the following format:

{
"task_name": {
"ip1": ["hint1", "hint2", ...],
"ip2": ["hint1", "hint2", ...]
}
}


Hints are useful for situations when there are a lot of traffic on services and you can't find users with flags.
So hints will be ids, usernames, etc of users with alive flags.

Information about hints for each service will be posted after the game start.

CONFIGS

Configs arhive:

- 20 configs for team members
- 1 config for vulnbox (*)
- readme.txt, here you can find information about connection to your cloud machine

(*)
If you choose Cloud hosting, you don't need it. Config will be automatically loaded to the your machine. Services can be found in /tasks directory.
If you choose Self-Hosted, you have to activate vulnbox config and download services from website with [services] command in the registration terminal.

ROUNDS AND FLAGS

Round lasts {will be announced later} seconds.
Flag is alive for {will be announced later} rounds.
A&D trainings (channel) pinned «🔥🌚🔥 On the 18th of October we are holding our second RundergroundCTF! DATE The competition is planned to start at 11:00 UTC, and we’ll be playing for around 6 hours in total, including 1 hour of closed network. No more than 20 people are allowed to…»
You can also join our IRC channel #cbsctf on https://webchat.freenode.net/
Registration will be closed at 09:00 UTC (12:00 MSK).
Important information for players. Some services contain README.md files. Please read them carefully, some services do not follow usual A/D style!
Registration is closed
PASSWORD-PROTECTED CONFIGS ARE AVAILABLE NOW
Round time - 90 secs
Flag lifetime - 10 rounds

You will be able to get your team token and config on https://register.cbsctf.live/ with show_reg command and password with get_password command.

Services archive will be posted in @cbsctf_c channel for self-hosted teams

DO NOT FORGET ABOUT ATTACK DATA. Hints for tasks will be available on http://10.10.10.10/api/attack_data

sijang - weapon token
moim - sync id
doseo - user login
sumgyeojin - no attack data, read README.md

If you are using cloud-hosted setup then DO NOT USE vuln.conf IT IS IMPORTANT
If you are using self-hosted setup then run services from channel on your machine and activate vuln.conf
Teams ips are 10.80.[0-66].2
services.zip
10.6 MB
Config archive password is b8673b3d4d0e80eb67958187e4ccc970. Services archive (unprotected) are attached.