Registration is open. You're welcome to join our vault!
Remind you, RuCTFE 2018 will be held on November 10th.
https://ructfe.org/registration
Remind you, RuCTFE 2018 will be held on November 10th.
https://ructfe.org/registration
This time, first place takes $2048, second takes $1024 and third takes $512. Top students will be invited to @RuCTF. Also we have some surprises for our winners, but we'll tell about them later 😄
We have resent confirmation letters for teams, that used @mail.ru PoC emails, because there were some technical problems. Please, check emails and confirm your registration :)
Good news everyone! We have became DEF CON 27 CTF qualifying event. For those who do not know DEF CON is the world's largest underground hacking conference. Winning team, despite the eligibility to take part in @RuCTF, will be invited to DEF CON CTF
https://twitter.com/oooverflow/status/1058466245232787456
https://twitter.com/oooverflow/status/1058466245232787456
Twitter
Overflow
Attention Hackers: All qualifying events for #DC27CTF (the winners will automatically be qualified for @defcon 27 CTF): HITCON CTF RuCTFe C3CTF PlaidCTF 0CTF https://t.co/rOp7vE8DCb /cc @thedarktangent
We have sent to PoC of teams credentials for VPN and RuCTFE Cloud access, please check your email (also check "Spam" folder!). If you haven't received the letter, you can request it again: https://ructfe.org/restore_config/
Also you can take a look at page https://ructfe.org/network and find out there everything about the network.
This year RuCTFE Cloud will be available, so check out this FAQ: https://ructfe.org/cloud-faq/
This year RuCTFE Cloud will be available, so check out this FAQ: https://ructfe.org/cloud-faq/
Vulnerable image is available!
Here: https://yadi.sk/d/kuCWNslEdmcVSw, here: https://mega.nz/#!MBNm3KLZ!R9wnaslwKUtNgNDQbfVkgnvKcldqK2DPA19pMJrhG5E, here: https://drive.google.com/file/d/1yACzhvHssr3IbTL5Kk_kX4_bykoBk_4h/view?usp=sharing and here: https://ftp.hackerdom.ru/ctf-images/2018-11-10-RuCTFE2018/
Torrent file: https://live.ructf.org/ructfe2018.7z.torrent
sha256sum:
sha256sum:
Decryption key will be available at 10:00UTC here.
Also if your team is based in Yekaterinburg, contact @ktwzk to get USB flash drive with image (just kidding, but feel free to ask him any questions from any city)
Here: https://yadi.sk/d/kuCWNslEdmcVSw, here: https://mega.nz/#!MBNm3KLZ!R9wnaslwKUtNgNDQbfVkgnvKcldqK2DPA19pMJrhG5E, here: https://drive.google.com/file/d/1yACzhvHssr3IbTL5Kk_kX4_bykoBk_4h/view?usp=sharing and here: https://ftp.hackerdom.ru/ctf-images/2018-11-10-RuCTFE2018/
Torrent file: https://live.ructf.org/ructfe2018.7z.torrent
sha256sum:
f6390ae2463f0a73353c27e82d0982ff0d4e4db0f40d8ab046c1554a31f855cf ructfe2018.7zsha256sum:
7f371066357199a54f0999178d37b9edeed0fe1d4fd834f07fb0770184f70b95 ructfe2018.ovaDecryption key will be available at 10:00UTC here.
Also if your team is based in Yekaterinburg, contact @ktwzk to get USB flash drive with image (just kidding, but feel free to ask him any questions from any city)
*Reminder*
If you need to re-download your config files, use this link: https://ructfe.org/restore_config
If you need to re-download your config files, use this link: https://ructfe.org/restore_config
ructfe.org
RuCTFE 2020 > GET CONFIG
RuCTFE is an annual online international challenge in information security. It has been held 11 times already.
Decryption key is
The network will be opened at 11:00 UTC.
Good luck!
xHP27YozeRCxpbHMVr2onETkxwPgdzDcEBTw6MfmRuCTFE Cloud Console now available at https://cloud.ructfe.org
The network will be opened at 11:00 UTC.
Good luck!
If you have problems with access to cloud:
1. Check that you use token from archive and it starts with your team number and underscore
2. If you don't have archive, get it here: ructfe.org/login_team
3. If you have problems with login_team, use ructfe.org/restore_config
Also we don't know root password from vulnbox. We've lost it. Now it's your problem
1. Check that you use token from archive and it starts with your team number and underscore
2. If you don't have archive, get it here: ructfe.org/login_team
3. If you have problems with login_team, use ructfe.org/restore_config
Also we don't know root password from vulnbox. We've lost it. Now it's your problem
Network is open!
Monitor: http://monitor.ructfe.org (for oldfags: http://monitor.ructfe.org/board)
Have a good game!
Monitor: http://monitor.ructfe.org (for oldfags: http://monitor.ructfe.org/board)
Have a good game!
Shadow Servants got absolute first blood for
laberator service! Congratulations!CRITICAL FIX
You have files:
/home/vch/NTPTools/bin/Release/netcoreapp2.1/NTPTools.dll
/home/vch/NTPTools/obj/Release/netcoreapp2.1/NTPTools.dll
/home/vch/VchAPI/bin/Release/netcoreapp2.1/NTPTools.dll
/home/vch/Vch.Core/bin/Release/netcoreapp2.1/NTPTools.dll
Please replace every of it with: https://live.ructf.org/NTPTools.dll
You have files:
/home/vch/NTPTools/bin/Release/netcoreapp2.1/NTPTools.dll
/home/vch/NTPTools/obj/Release/netcoreapp2.1/NTPTools.dll
/home/vch/VchAPI/bin/Release/netcoreapp2.1/NTPTools.dll
/home/vch/Vch.Core/bin/Release/netcoreapp2.1/NTPTools.dll
Please replace every of it with: https://live.ructf.org/NTPTools.dll
RuCTFE [DEPRECATED]
CRITICAL FIX You have files: /home/vch/NTPTools/bin/Release/netcoreapp2.1/NTPTools.dll /home/vch/NTPTools/obj/Release/netcoreapp2.1/NTPTools.dll /home/vch/VchAPI/bin/Release/netcoreapp2.1/NTPTools.dll /home/vch/Vch.Core/bin/Release/netcoreapp2.1/NTPTools.dll…
After fix you need to restart vch service!
systemctl restart vchHint: hover on service field to know the reason of DOWN status
monitor.ructfe.org
monitor.ructfe.org
FIX FOR LABERATOR
sed -i 's/(ListingLimit).Find(\&users)/(100).Find(\&users)/g' /home/laberator/db.gothen
service laberator restart