running Room 14 : Join the game

Virtual environnement to attack can be reached at : ctf14.root-me.org
Time remaining : 00:17:32

Informations

  • Virtual environnement chosen : ARP Spoofing EcouteActive
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "ARP Spoofing Active Listening"

    Your friend assures you that you cannot retrieve confidential information that passes through his network. He is so confident that he gives you access to his LAN via a host that you control.

    The flag is the concatenation of the response to a network query, along with the database password, in the following form: reponse:db_password.

    • Start the CTF-ATD "ARP Spoofing EcouteActive"
    • Log in with SSH on the machine port 22222 (root:root)
    • There is no validation of the virtual environment with a /passwd

    Do not hesitate to change the password of the root user in order to be alone on the machine to perform your manipulations. Game duration : 60 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf26 waiting 0
ctf23 waiting 0
ctf29 waiting 0
ctf20 waiting 0
ctf27 waiting 0
ctf21 waiting 0
ctf30 waiting 0
ctf22 waiting 0
ctf31 waiting 0
ctf28 waiting 0
ctf32 waiting 0
ctf24 waiting 0
ctf33 waiting 0
ctf05 waiting 0
ctf25 waiting 0
ctf34 waiting 0
ctf19 waiting 0
ctf35 OpenClassrooms_SkP_Pentest_Web running
Time remaining : 02:48:46
1
Tekhat
ctf17 VulnVoIP running
Time remaining : 03:48:00
1
dams
ctf15 Ubuntu 8.04 weak running
Time remaining : 12:33:41
1
Cricaribe
ctf13 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:02:30
1
David Sargenton-Charles-Gervais
ctf11 Open My Vault running
Time remaining : 01:32:44
1
ThaneRoss
ctf10 BlackMarket running
Time remaining : 01:25:42
1
root4HK
ctf07 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:54:41
1
ph03n
ctf04 SSRF Box running
Time remaining : 01:58:15
1
Aland Han
ctf14 ARP Spoofing EcouteActive running
Time remaining : 00:17:32
1
Zlatar
ctf01 Windows XP pro 01 running
Time remaining : 01:03:48
2
anikitarchik, keyomok
ctf16 Websocket - 0 protection running
Time remaining : 02:03:10
2
3C4D, NowBlase
ctf12 Texode running
Time remaining : 02:47:45
2
dalifit, Nefbou123
ctf09 OpenClassrooms - DVWA running
Time remaining : 03:35:41
2
shiiv4, mejdi chebbi
ctf08 Relative Path Overwrite running
Time remaining : 01:07:48
2
Laluka, dryy
ctf18 Docker - I am groot running
Time remaining : 03:51:13
2
UnknowGuy, SmellyCode
ctf02 Apprenti-Scraper running
Time remaining : 01:51:06
3
alica, draking006, markh0rr
ctf06 Ubuntu 8.04 weak running
Time remaining : 03:14:09
3
Rokaliex, Mk4ce, bald72
ctf03 End Droid running
Time remaining : 01:42:57
4
n0n0, mrxsh1, Donald_Trumpov, loulou13

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Metasploitable 2 1 27 February 2019 at 06:18 -
- Bluebox 2 - Pentest 0 27 February 2019 at 09:27 -
Duff LAMP security CTF5 1 27 February 2019 at 09:05 0h07
Miyoyo SSH Agent Hijacking 2 26 February 2019 at 23:49 0h21
Merveille Santi ZINSOU Kioptrix level 2 3 27 February 2019 at 09:24 2h56