Virtual environnement to attack can be reached at : ctf08.root-me.org
Time remaining : 00:37:46
Informations
- Virtual environnement chosen : ARP Spoofing EcouteActive
- Description : Attention : this CTF-ATD is linked to the challenge "ARP Spoofing Active Listening"
Your friend assures you that you cannot retrieve confidential information that passes through his network. He is so confident that he gives you access to his LAN via a host that you control.
The flag is the concatenation of the response to a network query, along with the database password, in the following form:
reponse:db_password
.- Start the CTF-ATD "ARP Spoofing EcouteActive"
- Log in with SSH on the machine port 22222 (root:root)
- There is no validation of the virtual environment with a /passwd
Do not hesitate to change the password of the root user in order to be alone on the machine to perform your manipulations. Game duration : 60 min
- Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- Talah (choice : ARP Spoofing EcouteActive, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | LAMP security CTF5 | 1 | 3 March 2019 at 09:19 | - |
- | Windows XP pro 01 | 0 | 3 March 2019 at 05:38 | - |
- | SSH Agent Hijacking | 1 | 3 March 2019 at 12:24 | - |
- | LAMP security CTF5 | 1 | 3 March 2019 at 10:51 | - |
- | LAMP security CTF6 | 0 | 3 March 2019 at 03:27 | - |