Challenge CTF sur root-me.org
|
Denis Aouir |
Théo Dumont |
Félix Larrue |
Alexiane Laude |
Anaïs Schlienger |
Shuxin Shi |
Loïc Simon |
Vincent Tableau-Roche |
Alexis Thomas |
Web client |
JavaScript - Authentification (Très facile, 5) |
|
X |
X |
X |
X |
X |
X |
|
X |
JavaScript - Authentification 2 (Très facile, 10) |
X |
X |
X |
X |
X |
X |
X |
|
X |
XSS - Stockée 1 (Facile, 30) |
|
X |
X |
|
|
X |
X |
|
X |
XSS - Stockée 2 (Moyen, 50 ) |
|
|
X |
|
|
|
|
|
|
CSRF - 0 protection (Moyen, 35) |
|
X |
X |
|
|
X |
|
|
X |
CSRF - contournement de jeton (Moyen, 45) |
|
|
X |
|
|
|
|
|
|
XSS - Stored - contournement de filtres (Difficile, 80) |
|
|
|
|
|
|
|
|
|
Web server |
HTML - Code source (Très facile, 5) |
X |
X |
X |
X |
X |
X |
X |
|
X |
HTTP - User-agent (Facile, 10) |
X |
X |
X |
X |
X |
X |
X |
|
X |
HTTP - POST (Facile, 15) |
X |
X |
X |
X |
X |
|
X |
|
X |
JSON Web Token (JWT) - Introduction (Moyen, 20) |
X |
X |
X |
|
|
|
X |
|
X |
JSON Web Token (JWT) - Secret faible (Moyen, 25) |
X |
X |
X |
|
|
|
|
|
X |
PHP - Unserialize overflow (Difficile, 40) |
|
|
|
|
|
|
X |
|
|
GraphQL (Difficile, 40) |
|
X |
X |
|
|
|
X |
|
X |
Programmation |
IRC - Retour au collège (Moyen, 5) |
|
|
|
|
|
|
X |
|
|
Quick Response Code (Difficile, 40) |
X |
|
|
|
|
X |
X |
|
|
ELF x64 - Sandbox shellcoding (Difficile, 60) |
X |
|
|
|
|
|
|
|
|
App script |
Powershell - Command injection (Très facile, 10) |
|
|
|
|
|
X |
X |
|
|
Powershell - SecureString (Facile, 15) |
|
|
|
|
|
X |
|
|
|
LaTeX - Input (Facile, 10) |
|
X |
X |
|
|
X |
X |
|
|
Python - input() (Facile, 20) |
X |
X |
X |
|
X |
X |
X |
|
X |
Bash - Shells restreints (Difficile, 70) |
X |
|
|
|
|
|
|
|
|
App Système |
ELF x86 - Stack buffer overflow basic 1 (Très facile, 5) |
X |
|
|
|
|
X |
|
X |
|
ELF x86 - Format string bug basic 1 (Facile, 15) |
X |
|
|
|
|
X |
|
X |
|
PE32 - Stack buffer overflow avancé (Moyen, 35) |
|
|
|
|
|
|
|
|
|
Réseau |
TELNET - authentification (Très facile, 5) |
X |
X |
X |
|
|
X |
X |
|
X |
IP - Time To Live (Très facile, 15) |
X |
X |
|
X |
|
X |
|
|
X |
ETHERNET - Transmission altérée (Moyen, 25) |
|
|
|
|
|
|
|
|
|
Forensic |
Active Directory - GPO (Facile, 30) |
|
|
|
|
|
|
|
|
|
Entretien à l'ANSSI (Difficile, 35) |
X |
X |
|
|
|
|
|
|
X |
Réaliste |
Root them (Moyen, 40) |
|
|
|
|
|
|
|
|
|
Well-known (Difficile, 35) |
|
|
|
|
|
|
|
|
|
Cryptanalyse |
Service - Timing Attack (Moyen, 25) |
X |
X |
|
|
|
|
|
|
|
Cracking |
GB - Basic GameBoy crackme (Moyen, 30) |
|
|
|
|
|
|
|
|
|
Bash - VM (Difficile, 60) |
|
|
|
|
|
|
|
|
|