On the 2nd of February we are holding our fifth open Attack-Defense training. We are expanding to an international arena and are going to test the brand-new infrastructure scheme to allow around 100 teams to participate.
The competition is planned to start at 11:00 UTC, and we’ll be playing for around 6 hours in total, including 30-60 minutes of closed network (although the duration can be flexible).
You can register (and find out some more details) using this Telegram bot: https://t.me/cbsctf_bot.
Competition chats are at https://t.me/cbsctf_en (international) or https://t.me/cbsctf (Russian).
Technical information:
Checksystem: https://github.com/pomo-mondreganto/ForcAD
Protocol for checksystem: https://gist.github.com/xmikasax/90a0ce5736a4274e46b9958f836951e7
Teams ips:
You can find services at /tasks on your vulnbox
Flag regex:
Scoreboard will be available on http://10.10.10.10:8080 (and http://10.10.10.10:8080/v :3) inside the ovpn network (public url will be announced later)
Flags are accepted at
Connection details:
Your team will be provided with 20 OpenVPN configs (each team member must a unique one) along with vulnbox ip address and credentials for ssh. We will send an archive with all these files right before the game with our bot (@cbsctf_bot), so be sure not to disable it.
The competition is planned to start at 11:00 UTC, and we’ll be playing for around 6 hours in total, including 30-60 minutes of closed network (although the duration can be flexible).
You can register (and find out some more details) using this Telegram bot: https://t.me/cbsctf_bot.
Competition chats are at https://t.me/cbsctf_en (international) or https://t.me/cbsctf (Russian).
Technical information:
Checksystem: https://github.com/pomo-mondreganto/ForcAD
Protocol for checksystem: https://gist.github.com/xmikasax/90a0ce5736a4274e46b9958f836951e7
Teams ips:
10.70.[0-N].2 (N is the number of teams). There also will be an NPC team (with ip `10.70.0.2`)You can find services at /tasks on your vulnbox
Flag regex:
[A-Z0-9]{31}=Scoreboard will be available on http://10.10.10.10:8080 (and http://10.10.10.10:8080/v :3) inside the ovpn network (public url will be announced later)
Flags are accepted at
10.10.10.10:31337 and 10.10.10.10:31338 (tcp services)Connection details:
Your team will be provided with 20 OpenVPN configs (each team member must a unique one) along with vulnbox ip address and credentials for ssh. We will send an archive with all these files right before the game with our bot (@cbsctf_bot), so be sure not to disable it.
Telegram
cbsctf bot
Register to C4T BuT S4D trainings using this bot
A&D trainings (channel) pinned «On the 2nd of February we are holding our fifth open Attack-Defense training. We are expanding to an international arena and are going to test the brand-new infrastructure scheme to allow around 100 teams to participate. The competition is planned to start…»
