Feel free to ask questions on info@ructfe.org and on irc://irc.hackerdom.ru/ructfe
If you have problems with importing .ova, please update VirtualBox to version 5.1.30+
RuCTFE2017 game network is open!
Scoreboard http://monitor.ructfe.org/
Scoreboard for oldschoolers: http://monitor.ructfe.org/old
You can post flag by TCP to flags.ructfe.org port 31337 or by HTTP to http://monitor.ructfe.org/flags (https://ructfe.org/http-flags/)
Good luck!
Scoreboard http://monitor.ructfe.org/
Scoreboard for oldschoolers: http://monitor.ructfe.org/old
You can post flag by TCP to flags.ructfe.org port 31337 or by HTTP to http://monitor.ructfe.org/flags (https://ructfe.org/http-flags/)
Good luck!
CRITICAL FIX
There is a bug in raster service, that why a lot of team have raster in down.
Here is a fix, just save it in /home/raster and restart container
https://gist.github.com/kotwizkiy/c561dc88b243d88530c34d4f9d2b20bf
There is a bug in raster service, that why a lot of team have raster in down.
Here is a fix, just save it in /home/raster and restart container
https://gist.github.com/kotwizkiy/c561dc88b243d88530c34d4f9d2b20bf
PirateCoin checker logic has been fixed. Now, it seems, that contracts can obtain some ethers from us.
TreasureMap checker has been updated. You can find new flags source.
TreasureMap checker has been updated. You can find new flags source.
RuCTFE 2017 is over!
First place: Bushwhackers
Second place: Eat Sleep Pwn Repeat
Third place: c00kies@venice
Thank you for a good game!
Please, leave us feedback: https://goo.gl/forms/mFNzd2uh2RDZPF862
First place: Bushwhackers
Second place: Eat Sleep Pwn Repeat
Third place: c00kies@venice
Thank you for a good game!
Please, leave us feedback: https://goo.gl/forms/mFNzd2uh2RDZPF862
First 15 teams from scoreboard:
1. 5070134.06 🇷🇺 Bushwhackers
2. 4449075.34 🇩🇪 Eat Sleep Pwn Repeat
3. 3827331.50 🇮🇹 c00kies@venice
4. 3682654.63 🇩🇪 saarsec
5. 2814660.28 🇷🇺 LC↯BC
6. 1837651.53 🇷🇺 ШАПКА ПЕТУХА
7. 1821620.78 🇷🇺 Destructive Voice
8. 1785986.34 🇦🇹 We_0wn_Y0u
9. 1775578.88 🇷🇺 EpicTeam
10. 1630455.16 🇷🇺 SiBears
11. 1515725.52 🇩🇪 Kernel Space Invaders
12. 1490836.38 🇺🇦 dcua
13. 1277822.31 🇵🇱 Dragon Sector
14. 1158179.68 🇷🇺 Lights Out
15. 1124259.37 🇩🇪 H4x0rPsch0rr
1. 5070134.06 🇷🇺 Bushwhackers
2. 4449075.34 🇩🇪 Eat Sleep Pwn Repeat
3. 3827331.50 🇮🇹 c00kies@venice
4. 3682654.63 🇩🇪 saarsec
5. 2814660.28 🇷🇺 LC↯BC
6. 1837651.53 🇷🇺 ШАПКА ПЕТУХА
7. 1821620.78 🇷🇺 Destructive Voice
8. 1785986.34 🇦🇹 We_0wn_Y0u
9. 1775578.88 🇷🇺 EpicTeam
10. 1630455.16 🇷🇺 SiBears
11. 1515725.52 🇩🇪 Kernel Space Invaders
12. 1490836.38 🇺🇦 dcua
13. 1277822.31 🇵🇱 Dragon Sector
14. 1158179.68 🇷🇺 Lights Out
15. 1124259.37 🇩🇪 H4x0rPsch0rr
Registration is open. You're welcome to join our vault!
Remind you, RuCTFE 2018 will be held on November 10th.
https://ructfe.org/registration
Remind you, RuCTFE 2018 will be held on November 10th.
https://ructfe.org/registration
This time, first place takes $2048, second takes $1024 and third takes $512. Top students will be invited to @RuCTF. Also we have some surprises for our winners, but we'll tell about them later 😄
We have resent confirmation letters for teams, that used @mail.ru PoC emails, because there were some technical problems. Please, check emails and confirm your registration :)
Good news everyone! We have became DEF CON 27 CTF qualifying event. For those who do not know DEF CON is the world's largest underground hacking conference. Winning team, despite the eligibility to take part in @RuCTF, will be invited to DEF CON CTF
https://twitter.com/oooverflow/status/1058466245232787456
https://twitter.com/oooverflow/status/1058466245232787456
Twitter
Overflow
Attention Hackers: All qualifying events for #DC27CTF (the winners will automatically be qualified for @defcon 27 CTF): HITCON CTF RuCTFe C3CTF PlaidCTF 0CTF https://t.co/rOp7vE8DCb /cc @thedarktangent
We have sent to PoC of teams credentials for VPN and RuCTFE Cloud access, please check your email (also check "Spam" folder!). If you haven't received the letter, you can request it again: https://ructfe.org/restore_config/
Also you can take a look at page https://ructfe.org/network and find out there everything about the network.
This year RuCTFE Cloud will be available, so check out this FAQ: https://ructfe.org/cloud-faq/
This year RuCTFE Cloud will be available, so check out this FAQ: https://ructfe.org/cloud-faq/
Vulnerable image is available!
Here: https://yadi.sk/d/kuCWNslEdmcVSw, here: https://mega.nz/#!MBNm3KLZ!R9wnaslwKUtNgNDQbfVkgnvKcldqK2DPA19pMJrhG5E, here: https://drive.google.com/file/d/1yACzhvHssr3IbTL5Kk_kX4_bykoBk_4h/view?usp=sharing and here: https://ftp.hackerdom.ru/ctf-images/2018-11-10-RuCTFE2018/
Torrent file: https://live.ructf.org/ructfe2018.7z.torrent
sha256sum:
sha256sum:
Decryption key will be available at 10:00UTC here.
Also if your team is based in Yekaterinburg, contact @ktwzk to get USB flash drive with image (just kidding, but feel free to ask him any questions from any city)
Here: https://yadi.sk/d/kuCWNslEdmcVSw, here: https://mega.nz/#!MBNm3KLZ!R9wnaslwKUtNgNDQbfVkgnvKcldqK2DPA19pMJrhG5E, here: https://drive.google.com/file/d/1yACzhvHssr3IbTL5Kk_kX4_bykoBk_4h/view?usp=sharing and here: https://ftp.hackerdom.ru/ctf-images/2018-11-10-RuCTFE2018/
Torrent file: https://live.ructf.org/ructfe2018.7z.torrent
sha256sum:
f6390ae2463f0a73353c27e82d0982ff0d4e4db0f40d8ab046c1554a31f855cf ructfe2018.7zsha256sum:
7f371066357199a54f0999178d37b9edeed0fe1d4fd834f07fb0770184f70b95 ructfe2018.ovaDecryption key will be available at 10:00UTC here.
Also if your team is based in Yekaterinburg, contact @ktwzk to get USB flash drive with image (just kidding, but feel free to ask him any questions from any city)