Virtual environnement to attack can be reached at : ctf30.root-me.org
Time remaining : 01:27:58
Informations
- Virtual environnement chosen : ARP Spoofing Man In The Middle
- Description : Warning : This CTF ATD is linked to the challenge "ARP Spoofing - The man in the middle"
Your friend wasn’t at all pleased that you’d managed to take control of his network and retrieve his confidential information. So this time he made the task much harder by making the database password much more complex.
You still have access to your friend’s LAN with an attacking machine that you control.
The flag is in the database located on one of the network hosts.
- Start the CTF-ATD "ARP Spoofing HommeDuMilieu"
- Log in with SSH on the machine port 22222 (root:root)
- There is no validation of the virtual environment with a /passwd
Do not hesitate to change the password of the root user in order to be alone on the machine to perform your manipulations. Game duration : 240 min
- Validation flag is stored in the file /passwd
- Only registered players for this game can attack the virtual environnement.
- A tempo prevent game starting to early or too late.
- Game will start when one player has choosen his virtual environnement and declared himself as ready.
Player's list
- Atlas_py (choice : ARP Spoofing Man In The Middle, ready)
World Map
CTF Results
Pseudo | Virtual Environnement | Attackers count | Time start | Environnement compromised in |
- | Awky | 1 | 4 March 2019 at 11:41 | - |
- | Hopital Bozobe | 0 | 4 March 2019 at 10:10 | - |
- | /dev/random : Pipe | 1 | 4 March 2019 at 09:51 | - |
- | Metasploitable | 1 | 4 March 2019 at 11:32 | - |
- | Metasploitable 2 | 2 | 4 March 2019 at 09:07 | - |