A&D trainings (channel)
373 subscribers
13 photos
2 files
31 links
A&D trainings by C4T BuT S4D (channel)
Download Telegram
5 minutes till everything is stopped
Special thanks to Austria!
On the 15th of March we are holding our first Attack-Defense blitz.

Blitz format is our experiment, a modification of a classic Attack-Defence with an aim to be more dynamic. There’ll be only 1 service, 2 players in each team (only 2 OpenVPN configs will be provided per team) and the game is much shorter, only 2 hours of open network time.

The competition is planned to start at 11:00 UTC, and we’ll be playing for around 2.5 hours in total, including 30 minutes of closed network (although the duration can be flexible).

You can register (and find out some more details) using this Telegram bot: @cbsctf_bot.

Competition chats are at @cbsctf_en (international) or @cbsctf (Russian).

Competition channel is at @cbsctf_c

Technical information:

Checksystem: https://github.com/pomo-mondreganto/ForcAD
Protocol for checksystem: https://gist.github.com/xmikasax/90a0ce5736a4274e46b9958f836951e7
Teams ips: 10.70.[0-N].2 (N is the number of teams). There also will be an NPC team (with ip 10.70.0.2)
You can find services at /tasks on your vulnbox
Flag regex: [A-Z0-9]{31}=
Scoreboard will be available on http://10.10.10.10:8080 (and http://10.10.10.10:8080/v :3) inside the ovpn network and on https://cbsctf.live in global network.
Flags are accepted at 10.10.10.10:31337 (tcp service)

Connection details:
Your team will be provided with 2 OpenVPN configs (each team member must use the unique one) along with vulnbox ip address and credentials for ssh.

Service language will be Python.
Please notice that team size is limited to 2 players.
Here are some extended technical details:

Checksystem: https://github.com/pomo-mondreganto/ForcAD
Protocol for checksystem: https://gist.github.com/xmikasax/90a0ce5736a4274e46b9958f836951e7
Teams ips: 10.70.[0-N].2 (N is the number of teams). There also will be an NPC team (with ip 10.70.0.2)
You can find services at /tasks on your vulnbox
Flag regex: [A-Z0-9]{31}=
Scoreboard will be available on http://10.10.10.10:8080 (and http://10.10.10.10:8080/live :3) inside the ovpn network and on https://cbsctf.live in global network.
Flags are accepted at 10.10.10.10:31337 (tcp service)
Each team will be given only 2 OpenVPN configs.

SSH password and configs (password-protected) will be accessible through the bot (press the “game” button for the menu). Password to access them will be broadcasted everywhere when the game starts.

Service language will be Python.
Round time will be 15 seconds, flag lifetime is 40 rounds (10 minutes). Service checks will be run every 10 seconds, uptime will be counted as (ok_checks + ok_puts)/(total_checks + total_puts).
Registration will be closed at 9:30 UTC, so hurry up!
Registration is closed.
There will be 75 teams.
You can now get connection config with /game command.
A&D trainings (channel) pinned «Here are some extended technical details: Checksystem: https://github.com/pomo-mondreganto/ForcAD Protocol for checksystem: https://gist.github.com/xmikasax/90a0ce5736a4274e46b9958f836951e7 Teams ips: 10.70.[0-N].2 (N is the number of teams). There also will…»
Password is a9cbb68d51259e6ecc2d26af7c3af930
You can now get your team token with /game command
Network will be opened at 11:30 UTC.
Network is opened. Good game!
Check failed verdict is DOWN actually. Will fix it in a minute
Congratulations to arsib sosi b for the first blood!
Here’s a little spoiler
Forwarded from Roman Nikitin
The game will end at 13:30 UTC.
Only 5 minutes left!