Rating: 5.0

Interception I - ARP poisoning: `arping -c 1 -U -s 192.168.0.2 192.168.0.1`

Interception II - `nmap` to discover which IP address has TCP port 8000 open, then ARP poison: `arping -c 1 -U -s 192.168.0.78 192.168.0.255`

Interception III - Login to one of the routers using weak credentials, then edit the link costs to reroute traffic through our router

[Read the full writeup here](https://ctf.zeyu2001.com/2021/metactf-cybergames/interception)

Original writeup (https://ctf.zeyu2001.com/2021/metactf-cybergames/interception).