Overview and Scope

Do note that the CTF environment is shared, and as such participants should avoid performing tasks that may be disruptive to others or cause network instability. While general guidelines are provided below, we encourage participants to use their judgment or reach out to the organizers if they're uncertain about any actions.

These are general internal etiquette guidelines to follow during internal assessments within companies. Adhering to these practices helps prevent disruptions to critical services and avoids potential legal issues for testers (e.g., adding unauthorized users to privileged groups).

Example of Disruptive Actions

Connection

The password for our target AP (RN-Lab) is rangevillagelab. Once connected, you should receive an IP address in the 10.3.99.1/24 range. In the interest of lowering skill barriers, a small guide here is available that walks you through the first couple of steps in this lab.

The given scenario is an assumed breach with the following domain credentials:

Kael_Riven
reggina

Scope

Flag Format

The flag format may vary depending on the question. In cases where you're asked to provide the NTLM hash of a user, it specifically refers to the NT hash portion. For example, if the extracted NTLM hash is: aad3b435b51404eeaad3b435b51404ee:8846f7eaee8fb117ad06bdd830b7586c, your answer should be: 8846f7eaee8fb117ad06bdd830b7586c.