RuCTFE 2017 is over /

First place: Bushwhackers
Second place: Eat Sleep Pwn Repeat
Third place: c00kies@venice
Thank you for a good game!
Please, leave us feedback

 

Read the legend and get the vulnerable image / torrent

Image requirements: 4 CPUs, 4GB RAM, 30GB HDD, VirtualBox 5.1.30+

sha256sum: bc650734a03004fed914da1f663fdfa5a6272e3714367978ba28ae1fc3211269 ructfe2017.ova.7z

sha256sum: 7e5f17986b955b5eb45f6edc75c4ade56f4aece94b9345aa2299eedd477512aa ructfe2017.ova

Here is the password to decrypt the vulnerable image:

a0KoSEoaXPl7HlvbQGMKiyKPB6

You can submit your flags:

  • to flags.ructfe.org TCP port 31337
  • to http://monitor.ructfe.org/flags, here is an example

 

INFO /

RuCTFE is an annual online international challenge in the information security. It has been held 8 times already.

The contest is driven by classic rules. Each team is given a set of vulnerable services. Organizers regulary fill services with private information — the flags. The goal of each team is to find vulnerabilities, fix them in their services and exploit them in order to get flags from other teams. Please refer to the rules page and Wikipedia article for slightly more info.

RuCTFE 2017 starts on December 2, 2017 at 10:00 UTC and will last for 9 hours. As usual, the network will be closed for the first hour.

Registration will be closed on December 2, 2017 at 08:00 UTC.

Top student teams according to the results of RuCTFE 2017 will be invited to the annual national Russian university challenge in the information security RuCTF 2018. 

112,000/ RUB

First place takes 64,000 RUB (~ $1024)
Second place takes 32,000 RUB (~ $512)
Third place takes 16,000 RUB (~ $256)

NEWS /

23 nov 2019
Thx for a good game! Repo is public now!
23 nov 2019
RuCTFE 2019 is over! Congratulations for saarsec, Bushwhackers and Corrupted Lights!
23 nov 2019
Oh, it was fast. Three firstbloods in a row.
SPONSORS /
INFRASTRUCTURE PARTNER /
DEVELOPERS /
PARTNERS /