User Tools

Site Tools


cctf_preliminary_experiment

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

cctf_preliminary_experiment [2017/08/25 15:00]
silvio.biagioni@unitn.it
cctf_preliminary_experiment [2021/01/29 10:58]
Line 1: Line 1:
-====== One-On-One Capture The Flag Contest - User Guide ====== 
  
-<​code>​ 
-             ​____________________________________________________ 
-            /                                                    \ 
-           ​| ​   _____________________________________________ ​    | 
-           ​| ​  ​| ​                                            ​| ​   | 
-           ​| ​  ​| ​ # echo Welcome! ​                           |    | 
-           ​| ​  ​| ​ Welcome! ​                                  ​| ​   | 
-           ​| ​  ​| ​ # rm -rf /                                 ​| ​   | 
-           ​| ​  ​| ​                                            ​| ​   | 
-           ​| ​  ​| ​                                            ​| ​   | 
-           ​| ​  ​| ​                                            ​| ​   | 
-           ​| ​  ​| ​                                            ​| ​   | 
-           ​| ​  ​| ​                                            ​| ​   | 
-           ​| ​  ​| ​                                            ​| ​   | 
-           ​| ​  ​| ​                                            ​| ​   | 
-           ​| ​  ​| ​                                            ​| ​   | 
-           ​| ​  ​| ​                                            ​| ​   | 
-           ​| ​  ​|_____________________________________________| ​   | 
-           ​| ​                                                     | 
-            \_____________________________________________________/​ 
-                   ​\_______________________________________/​ 
-                _______________________________________________ 
-             ​_-' ​   .-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-. ​ --- `-_ 
-          _-'​.-.-. .---.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.--. ​ .-.-.`-_ 
-       ​_-'​.-.-.-. .---.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-`__`. .-.-.-.`-_ 
-    _-'​.-.-.-.-. .-----.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-----. .-.-.-.-.`-_ 
- ​_-'​.-.-.-.-.-. .---.-. .-----------------------------. .-.---. .---.-.-.-.`-_ 
-:​-----------------------------------------------------------------------------:​ 
-`---._.-----------------------------------------------------------------._.---'​ 
- 
-</​code>​ 
- 
- 
-===== Before the Contest ===== 
- 
-  - The Team leader sends an email to silvio[dot]biagioni[at]unitn[dot]it] with object "CCTF Team", including the members of the Team in the CC list of the email. 
-  - An email will be sent to the Team's leader containing DETERLab username and a link to set the password. 
-  - The enrollment deadline is the **(DD)-th of MONTH at HH:MM**. 
- 
-The Rounds'​ dates are: 
-  * Warm-up Questionnaire:​ **DDst** of MONTH  
-  * Training Phase: **(DD+3)-(DD+13)th** of MONTH  
-  * One-On-One Attack Phase: **(DD+15)-(DD+16)th** of MONTH 
- 
-===== Training Phase (on your device) ===== 
- 
-  - Download Kali Linux ([[https://​drive.google.com/​drive/​URLtoATTACkIMAGE|Attack Clone]]) and TestREx ([[https://​drive.google.com/​drive/​URLtoTARGEtIMAGE|Target Clone]]) images. 
-  - Run the images on QEMU (TODO: ADD QEMU NETWORK CONFIGURATIONS TO THE FOLLOWING COMMANDS): <​code>​% qemu-system-x86_64 -drive file=KALI-RLG,​format=raw -m 2048 -enable-kvm</​code><​code>​% qemu-system-x86_64 -drive file=Ubuntu1604-STD,​format=raw -m 2048 -enable-kvm -redir tcp:​2222::​22</​code>​ 
-  - Perform your attacks against the target machine from your own browser, or out of the Kali Linux'​s command line, as many time you want. Restore the target containers, if needed, through the following commands: <​code>​ $ sudo python run.py --manual nodegoat__ubuntu-node-mongo --port 8888 </​code>​ <​code>​$ sudo python run.py --manual wordpress3.2__ubuntu-apache-mysql --port 80 </​code>​ 
-  - Write a brief report about the attack(s) that you are going to carry out during the One-On-One Attack Phase. ​ 
- 
- 
-===== One-On-One Attack Phase (on DETERLab) ===== 
- 
-  - The Team leader receives the experiment ID and the list of Qualified and Physical names of the client machines. Follows an example (in which the experiment ID is ''​exp1''​) of the information that will be received: <​file>​---------- tbreport.log -------- 
-Experiment: ExperCCTF1/​exp1 
-State: active 
- 
-Virtual Node Info: 
-ID              Type         ​OS ​             Qualified Name 
---------------- ------------ --------------- -------------------- 
-client1 ​        ​pc ​          ​KALI-RLG ​       client1.exp1.ExperCCTF1.isi.deterlab.net 
-server ​         pc           ​Ubuntu1604-STD ​ server.exp1.ExperCCTF1.isi.deterlab.net 
- 
-Physical Node Mapping: 
-ID              Type         ​OS ​             Physical ​   ​ 
---------------- ------------ --------------- ------------ 
-client1 ​        ​pc3000 ​      ​KALI-RLG ​       pc134 
-server ​         pc3060 ​      ​Ubuntu1604-STD ​ pc184 
-</​file>​ 
-  - To access your experimental nodes, you'll need to SSH into users.deterlab.net using your DETERLab username and password. Once you log in to users, you'll need to SSH again to your actual experimental nodes. ​ The network topology and the commands to access from the username ''​unitn9ab''​ to a client in the given example are described in the following picture. ADD IMAGE WITH TWO NODES  ​ 
-  - Attack the target as reported at the end of the Training Phase, making sure to use the correct Qualified Name  (in the example, ''​server.exp1.ExperCCTF1.isi.deterlab.net''​). 
- 
-===== Additional Material ===== 
-[[TODO: PRELIMINARY EXPERIMENT PRESENTATION]] 
cctf_preliminary_experiment.txt ยท Last modified: 2021/01/29 10:58 (external edit)