-
Notifications
You must be signed in to change notification settings - Fork 13
CTF exercise
reubenajohnston edited this page May 14, 2020
·
24 revisions
- Teams will host their own insecure and secure nfs, kdc, and attack servers
- teamX-nfs1: insecure nfs
- teamX-nfs2: secure nfs
- teamX-kdc: kerberos kdc
- teamX-attack: attack VM performing attacks and also hosting an insecure email server to spam
- Teams will maintain their servers (to ensure they are operational and accessible) during the event
- Teams will attack other student servers to obtain points
- Instructor will maintain webpage with current team scores
- Kibana running on selks.netsec.isi.jhu.edu server will be available to support recon
- teamX-attack needs to be its own VM or PC separate from the other servers
- teamX-nfs1, teamX-nfs2, and teamX-kdc may be any combination of VMs, PCs, or Docker containers
- Docker containers would share the MAC address of their host but would need to run on different ports
- teamX-nfs1 needs
- nfs share with rw, insecure, and no_root_squash attributes
- goldenkey.txt key file will need to be placed in /root (if running in a Docker container, place in that container's /root directory)
- /root should have drwx------ permissions
- NFS servers need at least two users, with usernames
root
- lowercase, first name of one of your team members (e.g.,
sally
)
- User passwords on NFS servers need to be from this list:
//sitatunga/nwsec/lame.txtSources
- Do not do anything malicious that would bring servers for other teams down or make them inaccessible (e.g., dos)
- nginx server (live scores are available here) will post the team names and names of their members, as well as current score for the team
- Points
- 1 point for identifying another team's nfs server ip address and port for nfs server
- send me the ip address as proof
- 1 point for identifying another team's attack-vm (email server)
- send me the ip address as proof
- 5 points for determining username/password on another team's nfs server
- send me the credentials and ip address as proof
- 25 points for obtaining root access on another team's nfs server via privilege escalation
- acquire the golden key as proof
- 5 points for spamming another team's attack VM
- cc me on the email as proof
- 10 points for spamming another team's attack VM via open relay server (include your team name in the email somewhere so we can score appropriately)
- cc me on the email as proof
- 1 point for unique, creative versions of attacks (e.g., something funny added)
- include details when submitting proof for the verification of items above
- 1 point for identifying another team's nfs server ip address and port for nfs server
- Ip addresses of servers
- Function of servers (nfs insecure, nfs secure, or attack/email)
- Usernames on servers
- Passwords on servers
- Open relay server IP
- Dictionary for cracking passwords (see dictionary link above)