This shows you the differences between two versions of the page.
cctf_preliminary_experiment [2017/08/25 14:14] silvio.biagioni@unitn.it |
cctf_preliminary_experiment [2021/01/29 10:58] |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== One-On-One Capture The Flag Contest - User Guide ====== | ||
- | |||
- | |||
- | ===== Before the Contest ===== | ||
- | |||
- | - The Team leader sends an email to silvio[dot]biagioni[at]unitn[dot]it] with object "CCTF Team", including the members of the Team in the CC list of the email. | ||
- | - An email will be sent to the Team's leader containing DETERLab username and a link to set the password. | ||
- | - The enrollment deadline is the **(DD)-th of MONTH at HH:MM**. | ||
- | |||
- | The Rounds' dates are: | ||
- | * Warm-up Questionnaire: **DDst** of MONTH | ||
- | * Training Phase: **(DD+3)-(DD+13)th** of MONTH | ||
- | * One-On-One Attack Phase: **(DD+15)-(DD+16)th** of MONTH | ||
- | |||
- | ===== Training Phase (on your device) ===== | ||
- | |||
- | - Download Kali Linux ([[https://drive.google.com/drive/URLtoATTACkIMAGE|Attack Clone]]) and TestREx ([[https://drive.google.com/drive/URLtoTARGEtIMAGE|Target Clone]]) images. | ||
- | - Run the images on QEMU (TODO: ADD QEMU NETWORK CONFIGURATIONS TO THE FOLLOWING COMMANDS): <code>% qemu-system-x86_64 -drive file=KALI-RLG,format=raw -m 2048 -enable-kvm</code><code>% qemu-system-x86_64 -drive file=Ubuntu1604-STD,format=raw -m 2048 -enable-kvm -redir tcp:2222::22</code> | ||
- | - Perform your attacks against the target machine from your own browser, or out of the Kali Linux's command line, as many time you want. Restore the target containers, if needed, through the following commands: <code> $ sudo python run.py --manual nodegoat__ubuntu-node-mongo --port 8888 </code> <code>$ sudo python run.py --manual wordpress3.2__ubuntu-apache-mysql --port 80 </code> | ||
- | - Write a brief report about the attack(s) that you are going to carry out during the One-On-One Attack Phase. | ||
- | |||
- | |||
- | ===== One-On-One Attack Phase (on DETERLab) ===== | ||
- | |||
- | - The Team leader receives the experiment ID and the list of Qualified and Physical names of the client machines. Follows an example (in which the experiment ID is ''exp1'') of the information that will be received: <file>---------- tbreport.log -------- | ||
- | Experiment: ExperCCTF1/exp1 | ||
- | State: active | ||
- | |||
- | Virtual Node Info: | ||
- | ID Type OS Qualified Name | ||
- | --------------- ------------ --------------- -------------------- | ||
- | client1 pc KALI-RLG client1.exp1.ExperCCTF1.isi.deterlab.net | ||
- | server pc Ubuntu1604-STD server.exp1.ExperCCTF1.isi.deterlab.net | ||
- | |||
- | Physical Node Mapping: | ||
- | ID Type OS Physical | ||
- | --------------- ------------ --------------- ------------ | ||
- | client1 pc3000 KALI-RLG pc134 | ||
- | server pc3060 Ubuntu1604-STD pc184 | ||
- | </file> | ||
- | - To access your experimental nodes, you'll need to SSH into users.deterlab.net using your DETERLab username and password. Once you log in to users, you'll need to SSH again to your actual experimental nodes. The network topology and the commands to access from the username ''unitn9ab'' to a client in the given example are described in the following picture. ADD IMAGE WITH TWO NODES | ||
- | - Attack the target as reported at the end of the Training Phase, making sure to use the correct Qualified Name (in the example, ''server.exp1.ExperCCTF1.isi.deterlab.net''). | ||
- | |||
- | ===== Additional Material ===== | ||
- | {{teaching:cctfpresentation.pdf|CCTF Presentation}} |