running Room 8 : Join the game

Virtual environnement to attack can be reached at : ctf08.root-me.org
Time remaining : 00:02:15

Informations

  • Virtual environnement chosen : ARP Spoofing EcouteActive
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "ARP Spoofing Active Listening"

    Your friend assures you that you cannot retrieve confidential information that passes through his network. He is so confident that he gives you access to his LAN via a host that you control.

    The flag is the concatenation of the response to a network query, along with the database password, in the following form: reponse:db_password.

    • Start the CTF-ATD "ARP Spoofing EcouteActive"
    • Log in with SSH on the machine port 22222 (root:root)
    • There is no validation of the virtual environment with a /passwd

    Do not hesitate to change the password of the root user in order to be alone on the machine to perform your manipulations. Game duration : 60 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf01 Open My Vault running
Time remaining : 00:25:14
4
Dexiios, dine, Kit, Sniper Squad
ctf02 OpenClassrooms - DVWA running
Time remaining : 02:35:22
2
Mindset, Unek821
ctf03 Rootkit Cold Case running
Time remaining : 00:51:53
1
Shivam Maurya
ctf04 djangocatz running
Time remaining : 02:44:02
2
sree, ravi
ctf05 SSRF Box running
Time remaining : 00:35:27
2
STRCPY, Rulio974
ctf06 End Droid running
Time remaining : 02:07:58
3
Nanakix, rpz75, LordRingono
ctf07 waiting 0
ctf08 ARP Spoofing EcouteActive running
Time remaining : 00:02:14
1
D0nald
ctf09 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:18:36
1
Flocx
ctf10 dasbox1 running
Time remaining : 03:17:14
3
shivohm, userT411, vader
ctf11 Django unchained running
Time remaining : 03:18:34
1
Rajesh Arora
ctf12 Well-Known running
Time remaining : 03:36:14
2
BabbouDream, Ram Ram
ctf13 End Droid running
Time remaining : 02:28:13
1
NaNI7823
ctf14 Windows - krbtgt reuse running
Time remaining : 01:39:49
1
JulienO
ctf15 waiting 0
ctf16 waiting 0
ctf17 waiting 0
ctf18 waiting 0
ctf19 waiting 0
ctf20 waiting 0
ctf21 waiting 0
ctf22 waiting 0
ctf23 waiting 0
ctf24 waiting 0
ctf25 waiting 0
ctf26 waiting 0
ctf27 waiting 0
ctf28 waiting 0
ctf29 waiting 0
ctf30 Websocket - 0 protection running
Time remaining : 01:39:01
1
raaphael273
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf34 waiting 0
ctf35 waiting 0

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- Hopital Bozobe 0 3 March 2019 at 23:15 -
- Exploit KB Vulnerable Web App 0 3 March 2019 at 21:47 -
- SamBox v1 1 3 March 2019 at 21:38 -
- Metasploitable 2 3 March 2019 at 21:32 -
SSH Agent Hijacking 1 3 March 2019 at 21:30 0h33