running Room 8 : Join the game

Virtual environnement to attack can be reached at : ctf08.root-me.org
Time remaining : 00:37:46

Informations

  • Virtual environnement chosen : ARP Spoofing EcouteActive
  • Description : 
    Attention : this CTF-ATD is linked to the challenge "ARP Spoofing Active Listening"

    Your friend assures you that you cannot retrieve confidential information that passes through his network. He is so confident that he gives you access to his LAN via a host that you control.

    The flag is the concatenation of the response to a network query, along with the database password, in the following form: reponse:db_password.

    • Start the CTF-ATD "ARP Spoofing EcouteActive"
    • Log in with SSH on the machine port 22222 (root:root)
    • There is no validation of the virtual environment with a /passwd

    Do not hesitate to change the password of the root user in order to be alone on the machine to perform your manipulations. Game duration : 60 min

  • Validation flag is stored in the file /passwd
  • Only registered players for this game can attack the virtual environnement.
  • A tempo prevent game starting to early or too late.
  • Game will start when one player has choosen his virtual environnement and declared himself as ready.

Player's list

World Map


0x0 35 Available rooms

Room Virtual environnement chosen State Attackers count
ctf01 BBQ Factory running
Time remaining : 01:35:38
5
1dl3, Cyrhades, userT411, senifaye, Matt6875
ctf02 Apprenti-Scraper running
Time remaining : 00:33:31
2
Arcghar, Gummgummm
ctf03 Websocket - 0 protection running
Time remaining : 00:57:02
3
Nanakix, Lescolin, clamulex
ctf04 Shared Objects Hijacking running
Time remaining : 00:51:38
1
0xFFFFFFFFFF
ctf05 SSRF Box running
Time remaining : 00:47:59
3
Loli, guestnet123, masterpiece_17
ctf06 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:46:08
1
Thomas Puyo
ctf07 k8s running
Time remaining : 00:58:37
1
jonasam
ctf08 ARP Spoofing EcouteActive running
Time remaining : 00:37:46
1
Talah
ctf09 End Droid running
Time remaining : 01:15:05
5
LeDawaa, Lunodeusp, vojty, calamar62, bambelby
ctf10 OpenClassrooms - DVWA running
Time remaining : 02:30:27
2
Berlou, Sevenbrains
ctf11 Windows - krbtgt reuse running
Time remaining : 01:15:23
1
zancrows
ctf12 Docker - Talk through me running
Time remaining : 02:00:59
2
Spykou, aniskhalfallah
ctf13 AppArmorJail1 running
Time remaining : 01:23:46
2
xiosec, Hamidreza
ctf14 Well-Known running
Time remaining : 01:30:42
3
sonce, gugus, capy
ctf15 OpenClassrooms_SkillProgram_AD1 running
Time remaining : 00:31:45
1
future12
ctf16 Docker - I am groot running
Time remaining : 02:01:32
2
3ltill0, Desir
ctf17 Kioptrix level 4 running
Time remaining : 03:00:52
1
zoubidou
ctf18 Windows - KerbeRoast running
Time remaining : 01:06:21
2
sonwever, NerfMrR
ctf19 waiting 0
ctf20 Windows - sAMAccountName spoofing running
Time remaining : 01:45:19
1
ribt
ctf21 waiting 0
ctf22 waiting 0
ctf23 waiting 0
ctf24 waiting 0
ctf25 waiting 0
ctf26 waiting 0
ctf27 waiting 0
ctf28 waiting 0
ctf29 waiting 0
ctf30 C for C-cure running
Time remaining : 03:24:24
1
Elweth
ctf31 waiting 0
ctf32 waiting 0
ctf33 waiting 0
ctf34 waiting 0
ctf35 waiting 0

CTF Results CTF Results

Pseudo Virtual Environnement Attackers count Time start Environnement compromised in
- LAMP security CTF5 1 3 March 2019 at 09:19 -
- Windows XP pro 01 0 3 March 2019 at 05:38 -
- SSH Agent Hijacking 1 3 March 2019 at 12:24 -
- LAMP security CTF5 1 3 March 2019 at 10:51 -
- LAMP security CTF6 0 3 March 2019 at 03:27 -