Arachne

Forward pivots are commonly used to access targets protected behind inbound firewall rules, such as a DMZ.  Forward pivots can be used to enable:

  • Host discovery
  • Service banner
  • Exploitation

Arachne contains the following pivot applications technologies:

  • Netcat
  • Socat
  • SSH
  • Chisel
  • SSF
  • Meterpreter
  • Socks Proxy

The objective for each level in this CTF is to use the given application to create a forward pivot to access the encrypted web server on the target device.  Each  webserver hosts the password to the next level.  An SSH connection to the pivot box will be provided to run the necessary commands to set up the pivot application. Wget, cURL, or a web browser can be used to view the flag.

curl -k https://downthewire.org:<port>