|Aymeric 63e0e28e1f||4 years ago|
|debian-ssh||4 years ago|
|php||4 years ago|
|resources||5 years ago|
|webroot||4 years ago|
|.gitignore||4 years ago|
|LICENSE||4 years ago|
|README.md||4 years ago|
|docker-compose.yml||4 years ago|
netrunner - [WEB] Challenge Santhacklaus
netrunner is a Web challenge proposed in three parts during the Santhacklaus CTF. This online event, santhacklaus.xyz, was a four students project from IMT Lille Douai (Telecom Lille). This Capture The Flag in jeopardy style lasted one week (14 to 21 December 2018) and gathered more than 400 participants.
To use this project, you need to install Docker and Docker-Compose.
You probably need to change the listening port in
docker-compose.yml file to avoid conflict with other softwares, like another Web server.
... ports: - "<chosen_port>:80" ...
Move into the root repository, then, build and start all the containers with this following command:
docker-compose up -d
Now, you can access to the first part of this challenge at localhost:<chosen_port> and others parts at localhost:2077.
That's all! 😉
You can find a online version of this project on CTF;space platform.
During and after the CTF
V, I got a mission for you!
We discoved a Netrunner who hack neural implants to create false memories. We spotted the target's interface on the Net at this address: http://IP
Find out who he is and a way to stop him.
Nice V! I owe you one!
But before we go to visit him, I would like to have a means of pressure. Here is his maintenance access: IP:PORT
See what you can do and let me know.
He seems to have a “ghost” in the shell
You doing great!
But this access is not enough. See if you can get privileged access, the same used by Zetatech technician for maintenance.
It will allow us to unplug it in case of a glitch.
Thank you for taking the time to write your solution! :)
You can contact me if you want to add your write-up in the list.
- Aymeric Sorek - alias deldel
This project is licensed under the GNU General Public License - see the LICENSE file for details