A&D trainings (channel)
373 subscribers
13 photos
2 files
31 links
A&D trainings by C4T BuT S4D (channel)
Download Telegram
A&D trainings (channel) pinned «Here are some extended technical details: Checksystem: https://github.com/pomo-mondreganto/ForcAD Protocol for checksystem: https://gist.github.com/xmikasax/90a0ce5736a4274e46b9958f836951e7 Teams ips: 10.70.[0-N].2 (N is the number of teams). There also will…»
Password is a9cbb68d51259e6ecc2d26af7c3af930
You can now get your team token with /game command
Network will be opened at 11:30 UTC.
Network is opened. Good game!
Check failed verdict is DOWN actually. Will fix it in a minute
Congratulations to arsib sosi b for the first blood!
Here’s a little spoiler
Forwarded from Roman Nikitin
The game will end at 13:30 UTC.
Only 5 minutes left!
Thank you all for the game!

Congratulations to top-3 teams:

1) arsib sosi b
2) Rezinoviy Kodzima
3) SVINOTA

We will be glad if you fill out the short feedback form: https://forms.gle/ui1as2bP36c4xHch7
Repository with services, checkers and sploits will be available here: https://github.com/C4T-BuT-S4D/blitz-15-03-2020

We’re not sponsored, so we are open for donations to make our next trainings even better.

Tinkoff (if you have multi wallet card): https://www.tinkoff.ru/sl/3JBSc9Kgiy0
DStream: https://donate.stream/cbsctf
Bitcoin: 1F6XjKjCMvHseScedHyH2xFpLybFGAfgZP

We are also glad to announce that the next competition we are holding will take place on 12th of April. It will have a classic Attack-Defence format (not blitz) and is created for you not to sleep the day RuCTF 2020 should have happened. All the teams with RuCTF invitation will be granted a special label in scoreboard. Be ready for a long battle and stay tuned!
Special thanks to @lucky624 for the service development!
Vulnboxes will be shut down in 5 minutes
The service had 4 vulnerabilities, and here are firstbloods for each vuln:
Also for those who loves Attack-Defence, we encourage you to play saarCTF (https://ctftime.org/event/980), which is organised by team saarsec. We will participate too.
We are glad to announce that on the 12th of April we are holding Attack-Defense Stay Home CTF 2020!

The competition is planned to start at 10:00 UTC, and we’ll be playing for 8 hours in total, including 1 hour of closed network.

You can register (and choose whether you want to host a vulnbox by yourself or in cloud) using this Telegram bot: @cbsctf_bot.

Competition chats are at @cbsctf_en (international) or @cbsctf (Russian).

Competition channel is at @Stay_Home_CTF

Technical information will be published later in the channel.

And don't forget to wash your hands!
Network topology for upcoming CTF
🔥🌚🔥
On the 14th of June we are holding our second Attack-Defense blitz.

The competition is planned to start at 11:00 UTC, and we’ll be playing for around 2 hours in total, including 30 minutes of closed network.

No more than 2 people are allowed to be in a single team.

You can register using this Telegram bot: @cbsctf_bot.

Competition chats are at @cbsctf_en (international) or @cbsctf (Russian).
Competition channel is at @cbsctf_c.

Service(s) languages are: NodeJs, Lua, Php, C.
More technical information will be posted later.
This time we’ll be running the game network using Wireguard, not OpenVPN. Simple how-to:

1. Install wireguard, instructions can be found here: https://www.wireguard.com/install/.

2. You’ll be given the config file (teamN_M.conf). All former constraints are applicable as well, so each configuration file can be used by one teammate only. To connect, run

wg-quick up <file>

on linux in terminal, or import the file into the native app on macOS or Windows. macOS also has wireguard-tools package with wg-quick command in Homebrew.

3. To disconnect, run

wg-quick down <file>