Virtual environnement to attack can be reached at : ctf10.root-me.org
Time remaining : 01:32:23
Informations
- Virtual environnement chosen : ARM FTP box
- Description : Attention : this CTF-ATD is linked to the challenge "ARM FTP Box"
My company asked me to develop a small FTP server for an IOT project. I found one on Github that should do the trick. Why reinvent the wheel?
If you can, find vulnerabilities on the FTP service and exploit them to get a shell on the machine, then find the way to get root privileges.
- The FTP service is running on the TCP/2121 port.
- Challenge validation password is in the /passwd-challenge file.
- The CTF-ATD validation password is in the /passwd file. Game duration : 240 min
- Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- AndreiIsTryngToHack (choice : ARM FTP box, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | Ubuntu 8.04 weak | 1 | 3 March 2019 at 23:30 | - |
- | VulnVoIP | 0 | 3 March 2019 at 23:12 | - |
- | Metasploitable | 1 | 3 March 2019 at 22:38 | - |
- | SamBox v2 | 0 | 3 March 2019 at 22:09 | - |
- | SAP Pentest | 0 | 3 March 2019 at 22:02 | - |