running Room 1 : Join the game

Virtual environnement to attack can be reached at : ctf01.root-me.org
Time remaining : 00:44:17

Informations

  • Virtual environnement chosen : ARP Spoofing EcouteActive
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "ARP Spoofing Active Listening"

    Your friend assures you that you cannot retrieve confidential information that passes through his network. He is so confident that he gives you access to his LAN via a host that you control.

    The flag is the concatenation of the response to a network query, along with the database password, in the following form: reponse:db_password.

    • Start the CTF-ATD "ARP Spoofing EcouteActive"
    • Log in with SSH on the machine port 22222 (root:root)
    • There is no validation of the virtual environment with a /passwd

    Do not hesitate to change the password of the root user in order to be alone on the machine to perform your manipulations. Game duration : 60 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf35 waiting 0
ctf28 waiting 0
ctf22 waiting 0
ctf23 waiting 0
ctf24 waiting 0
ctf25 waiting 0
ctf26 waiting 0
ctf27 waiting 0
ctf29 waiting 0
ctf30 waiting 0
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf04 waiting 0
ctf34 waiting 0
ctf21 waiting 0
ctf20 SamBox v1 running
Time remaining : 01:34:36
1
aizfloezgiufgiluglg
ctf01 ARP Spoofing EcouteActive running
Time remaining : 00:44:17
1
Yutsuki
ctf18 Docker - I am groot running
Time remaining : 03:52:42
1
ismael
ctf12 SSRF Box running
Time remaining : 00:14:54
1
Drago
ctf03 Open My Vault running
Time remaining : 02:56:10
1
Vulcain777
ctf05 Windows - ASRepRoast running
Time remaining : 01:17:46
1
MoDa
ctf07 BreakingRootme2020 running
Time remaining : 01:12:37
1
Pølyur
ctf11 Hopital Bozobe running
Time remaining : 02:40:36
1
Usern4me
ctf15 ARM FTP box running
Time remaining : 03:05:45
1
mitsuaki
ctf13 Awky running
Time remaining : 01:36:59
1
Bunoud
ctf17 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:36:37
1
Dimitri Dendelé
ctf14 AppArmorJail1 running
Time remaining : 01:35:24
2
Stonebeat, CDA1968
ctf10 Apprenti-Scraper running
Time remaining : 00:07:22
2
spystrach, louen
ctf09 I’m a Bl4ck H4t running
Time remaining : 02:53:10
2
sof, GREAT DNG
ctf06 Windows - KerbeRoast running
Time remaining : 00:48:58
2
Gringo, Damien
ctf19 Websocket - 0 protection running
Time remaining : 00:31:33
2
Rulio974, Ellipsis
ctf02 OpenClassrooms - DVWA running
Time remaining : 00:40:57
3
Chassaing, michael, SIDOU
ctf16 Metasploitable 2 running
Time remaining : 00:27:08
3
KTK, Zaaky, hajimero
ctf08 End Droid running
Time remaining : 01:05:38
4
cybernova1, sub, fdra10, Bernard

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
whitecr0wz Kioptrix level 3 1 4 March 2019 at 05:22 0h25
cysboy Hopital Bozobe 1 4 March 2019 at 09:08 0h19
- Kioptrix level 4 0 4 March 2019 at 05:09 -
whitecr0wz Kioptrix level 4 2 4 March 2019 at 05:00 0h05
- Imagick 1 4 March 2019 at 03:28 -