MEPhI CTF
2.69K subscribers
434 photos
17 videos
9 files
435 links
Contact - @pturtle
Download Telegram
Разворачиваем таски
Сделали таск на стегу
Природа настолько очистилась, что в борде появляются новые таски
Channel photo updated
Forwarded from A&D trainings (channel) ()
🔥🌚🔥
On the 18th of October we are holding our second RundergroundCTF!

DATE

The competition is planned to start at 11:00 UTC, and we’ll be playing for around 6 hours in total, including 1 hour of closed network.

No more than 20 people are allowed to be in a single team.

REGISTER

You can register here: https://register.cbsctf.live/

CHATS

Competition chats are at @cbsctf_en (international) or @cbsctf (Russian).
Competition channel is at @cbsctf_c. Here you will find all game notifications and necessary info.

VPN

Be aware that we are using Wireguard, not OpenVPN. Simple how-to:

1. Install wireguard, instructions can be found here: https://www.wireguard.com/install/.

2. You’ll be given the config file (teamN_M.conf). All former constraints are applicable as well, so each configuration file can be used by one teammate only. To connect, run

wg-quick up <file>

on linux in terminal, or import the file into the native app on macOS or Windows. macOS also has wireguard-tools package with wg-quick command in Homebrew.

3. To disconnect, run

wg-quick down <file>

TIMELINE

Game timeline:

— 10:30 password-protected configs arhive and services arhive are loaded to the server, so you can download them on https://register.cbsctf.live.
— 11:00 password is posted in the channel and sent via bot.
— 12:00 game network opens and the game officially begins.
— 17:00 the game ends.

CHECKSYSTEM

Checksystem:

https://github.com/pomo-mondreganto/ForcAD

What tokens are for:

After you've connected to the flag submission system, you must type your team token in the first line, followed by flags (one per line).

Simple script for flag submission:
https://gist.github.com/pomo-mondreganto/a864e3a259045846dee1fa0cb9fa68ea
Protocol for checksystem (for Destructive Farm):
https://github.com/DestructiveVoice/DestructiveFarm/blob/master/server/protocols/forcad_tcp.py

NETWORK

Teams ips: 10.80.[0-N].2 (N is the number of teams).
There also will be an NPC team (with ip 10.80.0.2 )
Flag regex: [A-Z0-9]{31}=
Scoreboard will be available on http://10.10.10.10 inside the wireguard network and on http://cbsctf.live in global network.
Flags are accepted at 10.10.10.10:31337 (tcp service)

POINTS AND SERVICES

Actual formula of service points change can be found here:

https://github.com/pomo-mondreganto/ForcAD/blob/master/backend/scripts/create_functions.sql#L41

Service statuses:

- OK: service works perfectly
- DOWN: service is inaccessible
- CORRUPT: checker can't get one of the old flags
- CHECK FAILED: organizers mistake, oops
- MUMBLE: everything else

IMPORTANT
There will also be checksystem api route to help you during the game. It will be accessible on http://10.10.10.10/api/attack_data during the game and will contains JSON data of the following format:

{
"task_name": {
"ip1": ["hint1", "hint2", ...],
"ip2": ["hint1", "hint2", ...]
}
}


Hints are useful for situations when there are a lot of traffic on services and you can't find users with flags.
So hints will be ids, usernames, etc of users with alive flags.

Information about hints for each service will be posted after the game start.

CONFIGS

Configs arhive:

- 20 configs for team members
- 1 config for vulnbox (*)
- readme.txt, here you can find information about connection to your cloud machine

(*)
If you choose Cloud hosting, you don't need it. Config will be automatically loaded to the your machine. Services can be found in /tasks directory.
If you choose Self-Hosted, you have to activate vulnbox config and download services from website with [services] command in the registration terminal.

ROUNDS AND FLAGS

Round lasts {will be announced later} seconds.
Flag is alive for {will be announced later} rounds.
Напоминаю, что первый нашедший очень мелкую ошибку в лекции получит приз
Forwarded from mello42
У нас 100 сабов на ютюб канале💪🏻спасибо всем причастным 🙋‍♂️
Forwarded from mello42
😕
Произошел завоз нового таска на веб
Forwarded from falamous starstrider
+ 3 таска
Добавил наконец-то нормальный таск
Добавил таск на ppc(sudoku)
П Р Е С С - Р Е Л И З
СОЧИ, 13 ОКТЯБРЯ 2020 ГОДА

В связи с резким повышением заболеваемости коронавирусной инфекцией команда SPRUSH приняла решение не проводить очное занятие по практической информационной безопасности 14 октября. Решайте домашку, господа.
Кто решит sudoku тому куплю Бояринъ
Итак, сегодня занятия не будет, потому что мы не успели подготовить материал, но если на следующей неделе будет такая же обстановка, то расскажем про Docker и контейнеризацию в принципе.
Прямо сейчас узнал крутую штуку: глава Advanced Threat Research Huawei, выпускник НИЯУ МИФИ, Денис Макрушин проводит сегодня открытую лекцию в 18:00, посвященную исследованию безопасности медицинских систем. Крайне рекомендую прийти послушать, опыта в ИБ у него столько, что всей нашей команде и не снилось.
Forwarded from Den
Всем привет! Сегодня в рамках открытой лекции, я расскажу про свое исследование безопасности медицинских систем, а также на практических примерах расскажу про "зашкварные истории", связанные с безопасностью организаций в сфере здравоохранения (например, как нашел мисконфигурации в холодильных камерах ирландского морга 😱). Like, share

Topic: Denis Makrushin's Open Lecture
Time: Oct 28, 2020 06:00 PM Moscow

Join Zoom Meeting
https://zoom.us/j/99214726183?pwd=aWxRMzFSNTB0QnVJQk1WQU9aM21tdz09

Meeting ID: 992 1472 6183
Passcode: 481186