A&D trainings (channel) pinned «🔥🌚🔥 On the 18th of October we are holding our second RundergroundCTF! DATE The competition is planned to start at 11:00 UTC, and we’ll be playing for around 6 hours in total, including 1 hour of closed network. No more than 20 people are allowed to…»
You can also join our IRC channel #cbsctf on https://webchat.freenode.net/
Registration will be closed at 09:00 UTC (12:00 MSK).
Important information for players. Some services contain README.md files. Please read them carefully, some services do not follow usual A/D style!
Round time - 90 secs
Flag lifetime - 10 rounds
You will be able to get your team token and config on https://register.cbsctf.live/ with show_reg command and password with get_password command.
Services archive will be posted in @cbsctf_c channel for self-hosted teams
DO NOT FORGET ABOUT ATTACK DATA. Hints for tasks will be available on http://10.10.10.10/api/attack_data
sijang - weapon token
moim - sync id
doseo - user login
sumgyeojin - no attack data, read README.md
If you are using cloud-hosted setup then DO NOT USE vuln.conf IT IS IMPORTANT
If you are using self-hosted setup then run services from channel on your machine and activate vuln.conf
Flag lifetime - 10 rounds
You will be able to get your team token and config on https://register.cbsctf.live/ with show_reg command and password with get_password command.
Services archive will be posted in @cbsctf_c channel for self-hosted teams
DO NOT FORGET ABOUT ATTACK DATA. Hints for tasks will be available on http://10.10.10.10/api/attack_data
sijang - weapon token
moim - sync id
doseo - user login
sumgyeojin - no attack data, read README.md
If you are using cloud-hosted setup then DO NOT USE vuln.conf IT IS IMPORTANT
If you are using self-hosted setup then run services from channel on your machine and activate vuln.conf
services.zip
10.6 MB
Config archive password is
b8673b3d4d0e80eb67958187e4ccc970
. Services archive (unprotected) are attached.Good luck, have fun! Pm @kekov or @pomo_mondreganto is something does not seems to work
There is a mistake in password on website. We will fix it soon. Correct password is
b8673b3d4d0e80eb67958187e4ccc970
DO NOT USE vuln.conf FILE IF YOU ARE NOT USING SELF-HOSTED SETUP
Hotfix for sumgyeojin if service does not start because of Perm Denied: remove storage/db.db file. We will try to apply patch soon