Skip to content

Attack & Defense CTF Farm based on S4DFarm/DestructiveFarm

License

Notifications You must be signed in to change notification settings

icc23-asia/ExploitFarm

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ExploitFarm

This is a fork S4DFarm, specialized for ICC 2023.

Overview

This service collects A&D flags from the laptops of Team Asia players, helping the team to automate flag submissions to the system while avoiding duplicated flag submissions.

How to use as players

How to write your exploits

Follow this guide to write your exploit.

How to automate to run your exploit periodically

After you wrote the exploit script, you can run it periodically by ./client/start_sploit.py to send the result to the ExploitFarm server. Then the ExploitFarm server will send the stolen flags to the A&D control plane!

For instance:

./client/start_sploit.py --server-url http://<HOST>:5137 --server-pass <PASSWORD> ./client/icc_demo_notes.py

How to use as Team Asia Infra Manager

How to deploy

Run the following command to deploy the whole service:

docker compose up --build -d

Screenshots

Some screenshots:

flags

teams

About

Attack & Defense CTF Farm based on S4DFarm/DestructiveFarm

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 62.6%
  • Vue 22.9%
  • JavaScript 8.0%
  • Go 3.8%
  • Dockerfile 1.1%
  • HTML 0.6%
  • Other 1.0%